Authentication protocol

Results: 881



#Item
821Computer security / Cyberwarfare / OpenVPN / Virtual private network / Two-factor authentication / Point-to-Point Tunneling Protocol / One-time password / Password / DrayTek / Computer network security / Tunneling protocols / Computing

Microsoft Word - 如何使用mOTP應用於SmartVPN Client撥打 VPN Tunnel_英文版_.doc

Add to Reading List

Source URL: www.draytek.co.za

Language: English - Date: 2010-07-02 05:25:28
822Internet standards / Internet protocols / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Man-in-the-middle attack / Key management / Internet / Cryptography / Computing

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prev

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-07-28 17:01:12
823Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-12-02 17:00:16
824Network protocols / Internet protocols / Cryptographic protocols / Wireless networking / IEEE 802.1X / Windows Rally / Extensible Authentication Protocol / Wireless security / Universal Plug and Play / Computing / Technology / Computer network security

Windows Connect Now–NET - 2 Windows Connect Now–NET - 2

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-12-11 17:10:47
825Home automation / Telecommunications engineering / Internet protocols / Z-Wave / Cryptographic protocols / ZigBee / Password authentication protocol / Transmission Control Protocol / Bluetooth / Wireless networking / Technology / Computing

Security Evaluation of the Z-Wave Wireless Protocol

Add to Reading List

Source URL: research.sensepost.com

Language: English - Date: 2013-08-14 07:38:54
826Computing / Spam filtering / Spamming / Sender Policy Framework / DomainKeys Identified Mail / SMTP Authentication / Mail submission agent / Simple Mail Transfer Protocol / Extended SMTP / Email authentication / Email / Computer-mediated communication

MAAWG_Email_Authentication_Paper_2008-07

Add to Reading List

Source URL: www.maawg.org

Language: English - Date: 2009-12-21 17:01:45
827Information / Cryptographic protocols / Computer network security / Internet protocols / Extensible Authentication Protocol / Password authentication protocol / RADIUS / Authentication protocol / Kerberos / Computing / Wireless networking / Data

Man-in-the-Middle in Tunneled Authentication Protocols N. Asokan, Valtteri Niemi, Kaisa Nyberg Nokia Research Center, Finland

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-11-13 05:00:33
828Cryptographic protocols / Data / Internet protocols / CRAM-MD5 / Digest access authentication / Simple Authentication and Security Layer / Lightweight Directory Access Protocol / Transport Layer Security / Password / Computing / Internet standards / Internet

SCRAM in LDAP Better Password-based Authentication Kurt Zeilenga

Add to Reading List

Source URL: people.apache.org

Language: English - Date: 2011-10-12 12:20:00
829Data / Wireless / Computer network security / IEEE 802.11 / Internet protocols / Extensible Authentication Protocol / IEEE 802.1X / Xsupplicant / EAP-SIM / Cryptographic protocols / Wireless networking / Computing

50055_80211_Protocol_4_1_rc.ai

Add to Reading List

Source URL: www.oreillynet.com

Language: English - Date: 2005-05-16 19:45:39
830Employment compensation / Psychotherapy / Mental health / Wireless networking / British Association for Counselling and Psychotherapy / Medicine / Computer network security / Extensible Authentication Protocol / Occupational safety and health / Health / Employee assistance program

UK Employee Assistance Professionals Association Employee Assistance Programmes:

Add to Reading List

Source URL: eapa.org.uk

Language: English - Date: 2012-11-22 09:55:27
UPDATE