Authentication protocol

Results: 881



#Item
801OSI protocols / Hypertext Transfer Protocol / HTTP cookie / Basic access authentication / MIME / Communications protocol / HTTP / Computing / Data

HttpClient Tutorial Oleg Kalnichevski Jonathan Moore Jilles van Gurp

Add to Reading List

Source URL: hc.apache.org

Language: English - Date: 2014-06-06 04:23:51
802Computing / Needham–Schroeder protocol / Near field communication / Communications protocol / Password authentication protocol / Cryptographic protocols / Data / Information

Formally defining NFC M-coupon requirements, with a case study Ali Alshehri, Steve Schneider Dept. of Computing, University of Surrey Guildford GU2 7XH, England Email: [removed] and [removed].

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-12-06 10:43:01
803Computer network security / HTTP / Password / Router / Basic access authentication / Communications protocol / Cross-site request forgery / Wireless security / Computing / Data / Information

Hacking D-Link Routers With HNAP SourceSec Security Research www.sourcesec.com Vulnerability Summary Multiple D-Link routers suffer from insecure implementations of the Home Network Administration

Add to Reading List

Source URL: www.sourcesec.com

Language: English - Date: 2010-01-19 21:58:02
804Proprietary software / Key management / Novell / Public key infrastructure / Unix / Directory service / Netoria / Extensible Authentication Protocol / Cryptography / Public-key cryptography / Novell NetWare

http://www.att.com/news[removed]bsa.html

Add to Reading List

Source URL: www.infoseccorp.com

Language: English - Date: 2003-11-12 12:55:00
805Computer architecture / Ubuntu / Protected Extensible Authentication Protocol / IEEE 802.11 / Technology / GlobalSign / Cryptographic protocols / Wi-Fi Protected Access / Wireless security / Wireless networking / Computer network security / Computing

Connecting to the Rovernet WPA2 Secured Wireless Network with with Ubuntu[removed]Intreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-06-22 11:40:33
806Cryptographic protocols / Computer security / Cyberwarfare / Windows XP / Wi-Fi / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / IEEE 802.1X / IEEE 802.11 / Computer network security / Computing / Wireless networking

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows XP Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to con

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-06-22 11:49:47
807Key management / Internet protocols / Internet standards / X.509 / Certificate authority / Public key certificate / HTTP Secure / OCSP stapling / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

When HTTPS Meets CDN: A Case of Authentication in Delegated Service Jinjin Liang∗, Jian Jiang∗, Haixin Duan∗, Kang Li§ , Tao Wan ¶ , Jianping Wu∗ ∗ Tsinghua University, § University of Georgia, ¶ Huawei Ca

Add to Reading List

Source URL: netsec.ccert.edu.cn

Language: English - Date: 2014-05-12 03:37:08
808Cyberwarfare / Kerberos / Server Message Block / NTLM / SMBRelay / Authentication protocol / Authentication server / Cain and Abel / Computer network security / Computing / Computer security

SMB Hijacking. Kerberos is defeated. © Ares, June[removed]removed]

Add to Reading List

Source URL: intercepter.nerf.ru

Language: English - Date: 2013-06-19 02:32:24
809Technology / Computing / Wi-Fi / Service set / Protected Extensible Authentication Protocol / IEEE 802.11 / Cryptographic protocols / Wireless security / Wi-Fi Protected Access / Wireless networking / Computer network security / Wireless

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to conn

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-09-09 12:30:51
810Cyberwarfare / Wireless security / IEEE 802.1X / Extensible Authentication Protocol / Wireless access point / Network Access Control / Wi-Fi Protected Access / Wireless LAN / Computer network / Computer network security / Computing / Technology

WHITE PAPER Security Best Practices for the Mobile Enterprise Securing the Enterprise Network as the Number and Types of Mobile Devices Proliferate

Add to Reading List

Source URL: www.enpointe.com

Language: English - Date: 2013-12-31 16:30:46
UPDATE