Authentication protocols

Results: 771



#Item
131Internet protocols / Internet standards / Software token / Authentication / RADIUS / Transaction authentication number / Access token / Password / One-time password / Security / Computer security / Security token

CAT - ONLINE IDENTITY PROTECTION! Do you have the same problem ? "With CAT we succeeded to wake up from a nightmare of handling RSA cards, for thousands of employees, tracking who lost it, who forgot it or who just left

Add to Reading List

Source URL: www.megaas.com

Language: English - Date: 2009-08-11 05:39:52
132Internet / RADIUS / Security / Access control / Network access server / Authentication / Internet protocols / Internet standards / Computing

PortaSwitch: External System Interfaces Guide MR44

Add to Reading List

Source URL: portaone.com

Language: English - Date: 2014-11-17 08:41:48
133Electronic engineering / Internet / RADIUS / Videotelephony / Network access server / Access token / H.323 / Authentication / Internet protocols / Computing / Internet standards

PortaSwitch: External System Interfaces Guide MR45

Add to Reading List

Source URL: portaone.com

Language: English - Date: 2015-01-23 05:56:49
134Email / Security / Computer network security / RADIUS / Authentication / IEEE 802.1X / Wireless security / Computing / Internet / Internet protocols

Nusoft Newsletter – IR Series No.26 Tech Overview : Recording Based upon Username-Authname Binding

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:27
135Direct Anonymous Attestation / Internet privacy / Civil law / Authentication / Computer security / AKA / Cryptographic protocols / Security / Cryptography

Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs Patrick P. Tsang† , Man Ho Au§ , Apu Kapadia†‡ , Sean W. Smith† † Department of Computer Science

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:08
136Information / Cryptographic protocols / Free software / ProVerif / Ciphertext indistinguishability / Communications protocol / Cryptographic primitive / Authentication / Tor / Cryptography / Cryptographic software / Data

Verification of security protocols — reducing the number of agents — Laboratory, institution and university LSV, ENS Cachan and LORIA, Nancy universités The internship will be located at Nancy and/or at ENS Cachan d

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2014-10-21 15:33:34
137Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / RSA / Otway–Rees protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Authenticity by Tagging and Typing ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Università Ca’Foscari di Venezia

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:43:38
138Spam filtering / Computer-mediated communication / Cryptographic protocols / Yahoo! / DomainKeys Identified Mail / SMTP Authentication / Simple Mail Transfer Protocol / Sender Policy Framework / Vouch by Reference / Email authentication / Email / Computing

draft-ietf-appsawg-rfc7001bis-07 - Message Header Field for Indicating Message Authentication Status

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-22 05:04:16
139Security token / Internet protocols / Internet standards / Authentication / RADIUS / Online banking / Two-factor authentication / One-time password / Security / Computer security / Computing

Microsoft Word - CATCaseStudiesWestforce.doc

Add to Reading List

Source URL: www.megaas.com

Language: English - Date: 2008-09-21 15:35:52
140Data / Wireless networking / IEEE 802.1X / Internet protocols / Extensible Authentication Protocol / Cryptographic protocols / RADIUS / Authenticator / Supplicant / Computing / Computer network security / Computer security

Chapter 2, Port-Based Authentication Concepts Author: Jim Geier Principal Consultant, Wireless-Nets, Ltd. Email: This chapter is a sample from the book

Add to Reading List

Source URL: www.wireless-nets.com

Language: English - Date: 2013-06-12 20:30:23
UPDATE