Authentication protocol

Results: 881



#Item
681Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
682Simple Mail Transfer Protocol / Extended SMTP / Sendmail / Port / Bounce address / Postmaster / Internet Message Access Protocol / SMTP Authentication / Local Mail Transfer Protocol / Email / Computer-mediated communication / Computing

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2007-10-06 00:12:06
683Open standards / Middleware / Advanced Message Queuing Protocol / WebSocket / Simple Authentication and Security Layer / OASIS / Hypertext Transfer Protocol / Computing / Message-oriented middleware / Inter-process communication

Advanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0 Committee Specification Draft 01 /

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2014-06-10 12:00:00
684Computer security / System software / Network Access Protection / IEEE 802.1X / Extensible Authentication Protocol / Network Admission Control / Cisco Systems / Windows / Supplicant / Computer network security / Computing / Windows Server

Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture Cisco Systems and Microsoft Corporation Published: September 2006

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-08-31 15:51:01
685Merchant services / Business / Secure communication / 3-D Secure / Payment systems / Authentication / Acquiring bank / Public key certificate / Transport Layer Security / Cryptography / Cryptographic protocols / Electronic commerce

J/Secureā„¢ Protocol Specification Ver.1.0 January 2008 2008 JCB Co., Ltd. All rights reserved.

Add to Reading List

Source URL: partner.jcbcard.com

Language: English - Date: 2011-07-08 04:06:09
686Eduroam / Computer network security / Internet standards / Wireless networking / IEEE 802.1X / RADIUS / Extensible Authentication Protocol / Internet Authentication Service / SURFnet / Computing / Internet protocols / Computer security

Microsoft Word - GN2-06-258v8 DJ5.1.5 Inter-NREN Roaming Infrastructure and Service Support _Cookbook, 1st version_.doc

Add to Reading List

Source URL: www.niif.hu

Language: English - Date: 2008-02-05 04:54:26
687Inter-process communication / Open standards / Middleware / Advanced Message Queuing Protocol / WebSocket / Simple Authentication and Security Layer / OASIS / Computing / Message-oriented middleware / Network architecture

Advanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0 Committee Specification Draft 01 / Public Review Draft[removed]June 2014

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2014-06-10 12:00:00
688Cyberwarfare / Trusted Network Connect / IEEE 802.1X / Network Access Control / RADIUS / Extensible Authentication Protocol / Juniper Networks / Trusted Computing Group / Wireless access point / Computer network security / Computer security / Computing

White Paper The Importance of Standards to Network Access Control Juniper Networks, Inc.

Add to Reading List

Source URL: www.opus1.com

Language: English - Date: 2008-04-28 05:03:54
689Eduroam / Internet protocols / IEEE 802.1X / RADIUS / Wireless networking / Extensible Authentication Protocol / AAA protocol / University Computing Centre / TERENA / Computing / Computer network security / Computer security

Microsoft Word - GN2-07-327v2 Deliverable DS5_1_1- eduroam Service Definition.doc

Add to Reading List

Source URL: www.niif.hu

Language: English - Date: 2008-02-05 04:54:26
690Computing / System software / Internet protocols / Intelligent Platform Management Interface / Password / RADIUS / Two-factor authentication / HP Integrated Lights-Out / Verax IPMI java library / System administration / Information technology management / Out-of-band management

dan farmer/ [removed]/June-23rd-2014/v[removed]Sold Down the River Summary A world-wide scan of the Intelligent Platform Management Interface (IPMI) protocol identified over 230,000 Baseboard Management Controllers (

Add to Reading List

Source URL: www.fish2.com

Language: English - Date: 2014-06-23 10:34:54
UPDATE