Authentication protocols

Results: 771



#Item
111Key management / Electronic commerce / Verifiable secret sharing / Key distribution / Interactive proof system / Diffie–Hellman key exchange / Authentication / Secret sharing / Computer network / Cryptography / Cryptographic protocols / Public-key cryptography

Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks Hitoshi Asaeda∗ , Musfiq Rahman† , Mohammad Hossein Manshaei‡ , Yasuko Fukuzawa§ University, Graduate School of Media and Governance

Add to Reading List

Source URL: web.sfc.wide.ad.jp

Language: English - Date: 2006-01-24 03:14:56
112Computer network security / Internet protocols / Internet standards / Directory services / Multi-factor authentication / Authentication / Lightweight Directory Access Protocol / Kerberos / Password / Security / Computer security / Computing

State of New Mexico Statewide Architectural Configuration Requirement Title: Authentication and Directory Services Standard S-STD001.002 Effective Date: October 18, 2005 1.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-09-24 10:13:21
113Network architecture / Real Estate Transaction Standard / HTTP / Cryptographic protocols / World Wide Web / Hypertext Transfer Protocol / Digest access authentication / Representational state transfer / Session / Computing / Network protocols / Real estate

RETS Certification System RETSand 1.8 Testing Rules Version: 02 June 2014 RETS Compliance & Certification

Add to Reading List

Source URL: www.reso.org

Language: English - Date: 2014-06-19 14:06:06
114National security / Electronic commerce / Cryptographic protocols / Password / Computer security / HTTP Secure / Two-factor authentication / Single sign-on / Password manager / Security / Secure communication / Crime prevention

Security Overview Who owns the data I put on my Dozuki site? You do! Dozuki has no claim of ownership on your site’s content. Will you (Dozuki) access my private content? Not unless you specifically ask us to, or if we

Add to Reading List

Source URL: f.cl.ly

Language: English - Date: 2014-03-04 19:48:33
115Cloud standards / Identity management / Identity management systems / Federated identity / Security Assertion Markup Language / OAuth / OpenID / SAML 2.0 / Real Estate Transaction Standard / Computing / Computer security / Security

Mission: "this group was formed to create "a cohesive [authentication] strategy and facilitate the use of recognized protocols. This group is "tasked with researching existing industry methods and recommending the adopt

Add to Reading List

Source URL: reso.memberclicks.net

Language: English - Date: 2013-10-14 18:00:13
116Steganographic file system / Serpent / Computer security / Tamper resistance / Ambient intelligence / Ross J. Anderson / Cryptography / Security / Lecture Notes in Computer Science

Bibliography [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–M Abadi, RM Needham,

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 10:00:47
117Cryptographic protocols / Electronic commerce / Public key certificate / X.509 / Identity document / Email authentication / Certificate authority / Smart card / Cryptography / Public-key cryptography / Key management

NIC Certifying Authority National Informatics Centre Ministry of Communications & Information Technology Government of India Photo & ID proof to

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2014-12-03 03:37:17
118Wi-Fi Protected Setup / Wireless networking / Technology / Telecommunications engineering / Extensible Authentication Protocol / IEEE 802.11 / Authenticator / HostAP / Supplicant / Wi-Fi / Cryptographic protocols / Computing

Brute forcing Wi-Fi Protected Setup When poor design meets poor implementationVersion 3

Add to Reading List

Source URL: sviehb.files.wordpress.com

Language: English - Date: 2011-12-27 05:58:32
119Security token / Keychain / Authentication protocol / Applied Cryptography and Network Security / AKA / Cryptography / Cryptographic protocols / MIFARE

PDF Document

Add to Reading List

Source URL: icsd.i2r.a-star.edu.sg

Language: English - Date: 2012-06-13 22:48:00
120Computer security / Yahoo! / Computing / Email / DomainKeys Identified Mail / Author Domain Signing Practices / DomainKeys / Email address / Domain Name System / Email authentication / Spam filtering / Cryptographic protocols

Internet Engineering Task Force (IETF) Request for Comments: 5863 Category: Informational ISSN: T. Hansen

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-05-27 14:26:10
UPDATE