Authentication protocol

Results: 881



#Item
871Information / IP / Zero-knowledge proof / Radio-frequency identification / NP / Communications protocol / Authentication protocol / Man-in-the-middle attack / Security parameter / Cryptography / Cryptographic protocols / Data

PDF Document

Add to Reading List

Source URL: sites.uclouvain.be

Language: English - Date: 2010-06-22 11:06:21
872Technology / Wireless / Computer network security / IEEE 802.11 / Secure communication / IEEE 802.11i-2004 / Wireless security / Extensible Authentication Protocol / IEEE 802.1X / Wireless networking / Cryptography / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-21 15:38:10
873Cyberwarfare / NTLM / LM hash / Integrated Windows Authentication / Authentication protocol / Security Support Provider Interface / LAN Manager / Crypt / SPNEGO / Computer security / Computing / Computer network security

PDF Document

Add to Reading List

Source URL: squirtle.googlecode.com

Language: English
874Wireless networking / Data / Information / Secure communication / Internet standards / Extensible Authentication Protocol / Transport Layer Security / Wi-Fi Protected Access / Captive portal / Computing / Cryptographic protocols / Computer network security

PDF Document

Add to Reading List

Source URL: riosec.com

Language: English - Date: 2010-05-19 20:38:21
875Standards organizations / Internet governance / Network architecture / Working groups / Network management / Extensible Authentication Protocol / IEEE Standards Association / Internet Engineering Task Force / IEEE 802.1X / Computing / Internet / Internet standards

PDF Document

Add to Reading List

Source URL: ietfreport.isoc.org

Language: English - Date: 2006-03-25 13:20:56
876Challenge-response authentication / Commitment scheme / IP / Zero-knowledge proof / Distance-bounding protocol / NP / Cryptographic nonce / Alice and Bob / Public-key cryptography / Cryptography / Cryptographic protocols / Complexity classes

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-07-23 09:02:44
877Smart cards / Smart card application protocol data unit / Common Interface / Authentication / Cryptography / ISO standards / Security

PDF Document

Add to Reading List

Source URL: www.ci-plus.com

Language: English - Date: 2011-10-25 14:06:36
878Wi-Fi Protected Setup / Wireless networking / Technology / Telecommunications engineering / Extensible Authentication Protocol / IEEE 802.11 / Authenticator / HostAP / Supplicant / Wi-Fi / Cryptographic protocols / Computing

PDF Document

Add to Reading List

Source URL: sviehb.files.wordpress.com

Language: English - Date: 2011-12-27 05:58:32
879Data / Network architecture / TACACS / RADIUS / AAA protocol / Kerberos / Network security / Authentication server / Computer network security / Computing / TACACS+

PDF Document

Add to Reading List

Source URL: www.tacacs.net

Language: English - Date: 2011-05-22 20:32:57
UPDATE