Authentication protocol

Results: 881



#Item
71Cryptography / Public key infrastructure / Public-key cryptography / Key management / Cryptographic protocols / Transport Layer Security / Public key certificate / X.509 / DocuSign / Online Certificate Status Protocol / SCVP / Authentication

    DocuSign  Confidential    

Add to Reading List

Source URL: certificates.docusign.com

Language: English - Date: 2014-02-20 15:11:45
72Software / World Wide Web / Free software / Apache HTTP Server / Reverse proxy / Hypertext Transfer Protocol / Httpd / Common Gateway Interface / Digest access authentication / Mod ssl / Mod proxy

Release Notes: Apache HTTP ServerApache HTTP Server Release Notes VersionSep/09

Add to Reading List

Source URL: www.midori-global.com

Language: English - Date: 2016-06-01 09:41:38
73Computing / Computer architecture / Computer network security / Wireless networking / IEEE 802.11 / Local area networks / Cryptographic protocols / Wireless / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Ubuntu / Cracking of wireless networks

Connecting to the Rovernet WPA2 Secured Wireless Network with with UbuntuIntreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
74Computing / Computer network security / Wireless networking / IEEE 802.11 / Wireless / Local area networks / Wi-Fi / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / IEEE 802.1X / Windows XP / Wireless security

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows XP Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to con

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
75Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

Add to Reading List

Source URL: mitls.org

Language: English
76Computer access control / Hypertext Transfer Protocol / Cryptographic protocols / Password / Security / Authentication / Phishing / HTTP cookie / Cryptographic nonce / Challengeresponse authentication / SQRL / HTTPS

I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-07-05 13:35:58
77Computer network security / Wi-Fi / Wireless networking / IEEE 802.11 / Wi-Fi Protected Access / IEEE 802.1X / AirPort / Wireless security / Extensible Authentication Protocol

Connecting to the Rovernet WPA2 Secured Wireless Network with the Mac OS XPanther) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirement

Add to Reading List

Source URL: www.it.mtu.edu

Language: English
78Computing / Wireless / Technology / Bluetooth / Universal 2nd Factor / FIDO Alliance / Near field communication / Authentication / Authenticator

Bluetooth & NFC Transport for FIDO U2F July 22, 2015 Executive Summary Universal 2nd Factor (U2F) is a Fast IDentity Online (FIDO) Alliance protocol that lets online applications and services augment the security of the

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2015-08-04 16:08:10
79Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
80Spam filtering / Email authentication / DMARC / DomainKeys Identified Mail / Sender Policy Framework / Simple Mail Transfer Protocol / Email / DomainKeys / Gmail / Outlook.com / Author Domain Signing Practices / Email spoofing

Guide DMARC: Monitor & secure your email delivery Chris Nagele Founder of Wildbit

Add to Reading List

Source URL: postmarkapp.com

Language: English - Date: 2015-12-24 12:33:02
UPDATE