Authentication protocol

Results: 881



#Item
751Cryptographic protocols / IEEE 802.11 / Technology / Computing / Wireless security / Wireless access point / Aircrack-ng / Lightweight Extensible Authentication Protocol / Wi-Fi Protected Access / Wireless networking / Cryptography / Computer network security

Operations Team Admin Advisory-003 Cipher suite selection for eduroam Service Providers

Add to Reading List

Source URL: www.eduroam.org

Language: English - Date: 2009-02-05 07:56:34
752Extensible Authentication Protocol / IEEE 802.11 / Computing / Wi-Fi / Wireless LAN controller / DBm / Wireless LAN / Wireless networking / Technology / Telecommunications engineering

Access Point WEA303e Radio Specifications 802.11a/b/g/n, Dual concurrent radio

Add to Reading List

Source URL: www.samsung.com

Language: English - Date: 2013-12-10 04:12:29
753IEEE 802.11 / Extensible Authentication Protocol / Wi-Fi / Wireless LAN / DBm / Wireless networking / Technology / Telecommunications engineering

Access Point WEA303i Radio Specifications 802.11a/b/g/n, Dual concurrent radio

Add to Reading List

Source URL: www.samsung.com

Language: English - Date: 2013-12-10 04:12:29
754Internet standards / Security / Lightweight Directory Access Protocol / Internet / Password / Authentication / Json2Ldap / Directory services / Computing / Internet protocols

LDAP Name & EMP ID Look Up Procedures (Lightweight Directory Access Protocol) LDAP is the State of Alaska Employee Directory, available on the State’s web site. Current state employees’ Legal Name and EMP ID (Employe

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2012-07-23 19:47:13
755Cryptographic protocols / Technology / Data / Wi-Fi / IEEE 802.1X / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / IEEE 802.11r-2008 / Computing / Computer network security / Wireless networking

Deploying iPhone and iPad Wi-Fi Out of the box, iPhone and iPad can securely connect to corporate or guest Wi-Fi networks, making it quick and simple to join available wireless networks whether you’re on campus or on

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2013-10-22 01:02:19
756PKCS / Smart card / Revocation list / Authentication / Public key infrastructure / Online Certificate Status Protocol / Self-signed certificate / Public key fingerprint / Cryptography / Public-key cryptography / FIPS 201

Microsoft Word - NISTIR 7870.doc

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2012-09-05 11:26:28
757Hypertext Transfer Protocol / POST / JavaScript / JSON / Basic access authentication / Computing / HTTP / HTTP cookie

Package ‘httr’ July 2, 2014 Type Package Title Tools for working with URLs and HTTP Version 0.3 Author Hadley Wickham

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 12:08:48
758Internet standards / Information / Computer network security / Internet protocols / Extensible Authentication Protocol / Cryptographic protocols / IEEE 802.1X / Authentication / RADIUS / Computing / Wireless networking / Data

NIST SP[removed], Recommendation for EAP Methods Used in Wireless Network Access Authentication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 15:18:12
759Technology / Computer network security / Extensible Authentication Protocol / Email / Computing / Internet

Masthead Messenger spring13

Add to Reading List

Source URL: humanresources.vermont.gov

Language: English - Date: 2014-06-16 10:06:27
760OpenID / Application programming interfaces / Gnolia / Web service / Twitter / SAML-based products and services / Social login / Computing / Cloud standards / OAuth

OAuth An open protocol to allow secure API authentication in a simple and standard method from desktop and web applications. OAuth: Open, secure delegation for web services Or, how to authorize access to your accounts wi

Add to Reading List

Source URL: wiki.oauth.net

Language: English - Date: 2008-05-09 23:13:03
UPDATE