Authentication protocols

Results: 771



#Item
101Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
102Rekeying / Data management / Computing / Graph theory / B-tree / R-tree / Binary tree

1 Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui, and David K. Y. Yau

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2005-06-19 23:01:08
103Security / Internet protocols / Internet standards / Directory services / RADIUS / Single sign-on / Fortinet / Two-factor authentication / Authentication / Computing / Computer security / Computer network security

DATA SHEET FortiAuthenticator™ User Identity Management and SIngle Sign-On

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:12
104Cryptographic protocols / HTTP / Password / Challenge-response authentication / Two-factor authentication / Security token / Digest access authentication / Cryptographic nonce / Authentication / Security / Cryptography / Computer security

CHAPTER 3 Protocols It is impossible to foresee the consequences of being clever.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:54
105Notary / Internet protocols / Access control / Authentication / Public key certificate / Password authentication protocol / Cryptography / Key management / Public-key cryptography

Online Certification/Authentication of Documents re: Business Entities – 201–April–05 Topic: Online Certification/Authentication of Documents re: Business Entities

Add to Reading List

Source URL: www.iaca.org

Language: English - Date: 2013-02-07 21:37:40
106Security / Internet protocols / Internet standards / Directory services / RADIUS / Single sign-on / Fortinet / Two-factor authentication / Authentication / Computing / Computer security / Computer network security

DATA SHEET FortiAuthenticator™ User Identity Management and SIngle Sign-On

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:12
107Consortia / Optical Internetworking Forum / Data / User–network interface / Internet protocols / Cryptographic protocols / RSVP-TE / Automatically switched optical network / IPsec / Fiber-optic communications / Network architecture / Computing

IA OIF-E2E-SECEnd-to-End Transport of UNI Client Authentication, Integrity, and Data Plane Security Support Information IA # OIF-E2E-SEC-01.0

Add to Reading List

Source URL: www.oiforum.com

Language: English - Date: 2012-06-05 14:52:51
108Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-01-13 10:28:23
109Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2012-01-15 19:52:05
110Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:55
UPDATE