Authentication protocol

Results: 881



#Item
671Wi-Fi Protected Access / Wireless access point / Protected Extensible Authentication Protocol / GUI widget / IEEE 802.11 / Electronic engineering / Electronics / Computer network security / Eduroam / Computing

Windows 7 Instructions for eduroam These instructions apply to Windows 7 only. Use these instructions to connect your Windows 7 laptop to the CANARIE wireless eduroam service. CANARIE uses Wireless Protected Access (or W

Add to Reading List

Source URL: www.canarie.ca

Language: English - Date: 2011-07-25 16:57:04
672Electronic engineering / Wireless networking / Eduroam / Protected Extensible Authentication Protocol / Electronics / Wireless access point / Wi-Fi Protected Access / Microsoft Windows / IEEE 802.1X / Computer network security / Computing / Windows XP

Windows XP Instructions for eduroam These instructions apply to Windows XP only. Use these instructions to connect your Windows XP laptop to the CANARIE wireless eduroam service. CANARIE uses Wireless Protected Access (o

Add to Reading List

Source URL: www.canarie.ca

Language: English - Date: 2011-08-25 16:35:05
673Computer-mediated communication / Computing / Spamming / Sender Policy Framework / Sender ID / Simple Mail Transfer Protocol / Internet security / Message transfer agent / Anti-spam techniques / Spam filtering / Email authentication / Email

Microsoft Word - Sender Policy Framework - new template version Sep.docx

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:39:45
674Computing / Computer-mediated communication / Anti-spam techniques / Email spam / Email authentication / CAN-SPAM Act / Spam / Open mail relay / Simple Mail Transfer Protocol / Spamming / Email / Internet

Whitepaper on a Proposed Do Not Email Registry April 12, 2004 Issued by:

Add to Reading List

Source URL: www.espcoalition.org

Language: English - Date: 2008-05-28 15:31:52
675Computer security / OAuth / Access token / Internet standards / Authentication / Authorization / RADIUS / AAA protocol / Computing / Internet protocols / Security

Internet Engineering Task Force (IETF) Request for Comments: 6749 Obsoletes: 5849 Category: Standards Track ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2012-10-12 18:41:28
676Electronic authentication / Access control / Security token / System administration / Cryptography / Password / Single sign-on / Authentication / Kerberos / Security / Computer security / Identity management

TE For intrusion detection and prevention system capabilities, stateful protocol analysis uses which of the following?

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-26 07:14:46
677Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-12-02 17:00:16
678Password authentication protocol / Password / Cloud computing / One-time password / HTTP / Cryptographic protocols / Password manager / Computing / Computer security / Security

European Parliament & Mobility AOUADI Fakhreddine Directorate-General for Innovation and Technological Support ICT in the European Parliament

Add to Reading List

Source URL: www.ictparliament.org

Language: English - Date: 2012-09-14 10:44:25
679Wireless networking / Computer network security / Extensible Authentication Protocol

Wie benutze ich den Einheitliche Ansprechpartner (EAP) Österreich

Add to Reading List

Source URL: www.wien.gv.at

Language: English - Date: 2014-05-25 15:55:46
680Internet standards / Internet protocols / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Man-in-the-middle attack / Key management / Internet / Cryptography / Computing

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prev

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-07-28 17:01:12
UPDATE