Authentication protocol

Results: 881



#Item
661Computer network security / Kerberos / Authentication / Cryptographic nonce / Public-key cryptography / Man-in-the-middle attack / Two-factor authentication / Extensible Authentication Protocol / Cryptography / Security / Cyberwarfare

CASCADED AUTHENTICATION Karen R. Sollins Massachusetts Institute of Technology Laboratory for Computer Science Cambridge, Ma[removed]

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2010-02-11 13:36:03
662Computing / Technology / Wireless / IEEE 802.11 / Wireless security / Extensible Authentication Protocol / IEEE 802.1X / Wi-Fi Protected Access / Wireless LAN / Wireless networking / Computer network security / Cryptographic protocols

Microsoft Word - NPS-CS[removed]doc

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2005-11-07 13:33:50
663Standards / Internet protocols / Internet standards / Cryptographic protocols / Revocation list / Online Certificate Status Protocol / Federal Reserve System / Federal Reserve Bank / Two-factor authentication / Cryptography / Public-key cryptography / FIPS 201

Attachment 2 Submitted by: Steve Malphrus, Board of Governors of the Federal Reserve System Date: December 22, 2004 General Comments on Public Draft FIPS 201 NIST Section 1.3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-27 01:00:00
664Certificate policy / Public key certificate / X.509 / Revocation list / Online Certificate Status Protocol / Public key infrastructure / Certificate authority / Authentication / FIPS 140-2 / Cryptography / Public-key cryptography / Key management

Microsoft Word - EGCA CPS v4 3_redacted _2_.docx

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2014-01-21 14:11:08
665Burnout / Work–life balance / Organizational behavior / Management / Protected Extensible Authentication Protocol / Extensible Authentication Protocol / Occupational safety and health / Employee assistance program / Employment compensation

November[removed]Questions Answers

Add to Reading List

Source URL: hr.wa.gov

Language: English - Date: 2014-09-03 15:32:53
666Identification / Authentication / Lightweight Directory Access Protocol / Globally unique identifier / Computing / Security / FIPS 201 / Standards

Comment on Draft FIPS 201 Standard (HSPD-12) Point of Contact Mark L. Silverman Comment Type Technical

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-27 01:00:00
667Certificate policy / X.509 / Revocation list / Public key infrastructure / Public key certificate / Certificate authority / Self-signed certificate / Online Certificate Status Protocol / Authentication / Cryptography / Public-key cryptography / Key management

X.509 Policy for the U.S. Federal PKI Common Policy Framework

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2014-06-16 09:43:21
668Security / Identity assurance / Liberty Alliance / Security Assertion Markup Language / SAML 2.0 / OpenID / Interoperability / Authentication / Identity / Computer security / Identity management

Federal Identity, Credential, and Access Management Trust Framework Solutions Identity Scheme and Protocol Profile Adoption Process Version 2.0

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2014-03-03 11:07:52
669Supervisor / Management / Computer network security / Extensible Authentication Protocol / Communication / Occupational safety and health / Employee assistance program / Employment compensation

August[removed]Questions Answers

Add to Reading List

Source URL: hr.wa.gov

Language: English - Date: 2014-09-03 15:32:49
670Computing / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / Internet of Things / Authentication protocol / Cryptographic protocol / Computer security / Technology / Human–computer interaction / Ubiquitous computing

Microsoft PowerPoint[removed]Security Privacy Models for IoT - D.Moriyama.pptx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:22:50
UPDATE