Authentication protocols

Results: 771



#Item
151Computing / Cryptography / Secure communication / Computer network security / Internet protocols / Transport Layer Security / Basic access authentication / Authentication / HTTP Secure / Security / Cryptographic protocols / HTTP

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-12-11 10:20:06
152Security / Secure communication / Data / HTTP Secure / Hypertext Transfer Protocol / Session / World Wide Web / Two-factor authentication / Cross-site request forgery / Computing / HTTP / Cryptographic protocols

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.3

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2014-05-11 17:31:12
153OSI protocols / Hypertext Transfer Protocol / HTTP cookie / Basic access authentication / MIME / Communications protocol / HTTP / Computing / Data

HttpClient Tutorial Oleg Kalnichevski Jonathan Moore Jilles van Gurp

Add to Reading List

Source URL: hc.apache.org

Language: English - Date: 2015-03-30 11:32:44
154Data / Information / RADIUS / Videotelephony / Interactive voice response / H.323 / Authentication / Attribute / Dialed Number Identification Service / Computing / Internet protocols / Internet standards

PortaBilling: External System Interfaces Guide

Add to Reading List

Source URL: portaone.com

Language: English - Date: 2010-07-16 11:15:54
155Internet protocols / Internet standards / Videotelephony / Digest access authentication / Session Initiation Protocol / Computing / Brekeke SIP Server / JavaScript

Brekeke PBX - Version 2.1 User Guide

Add to Reading List

Source URL: www.brekeke.com

Language: English - Date: 2013-03-29 15:51:49
156Computing / Computer network security / Cryptographic protocols / Internet protocols / Authenticator / HTTP cookie / Digest access authentication / Password authentication protocol / Kerberos / HTTP / Computer security / Security

Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster fubob, sit, kendras, feamster @mit.edu  MIT Laboratory for Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:14
157Technology / Wireless / Computer network security / IEEE 802.11 / Wi-Fi / Wireless security / Extensible Authentication Protocol / IEEE 802.11i-2004 / Wi-Fi Protected Access / Wireless networking / Cryptographic protocols / Cryptography

Cisco − Wi−Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi−Fi Protected Access 2 (WPA 2) Configuration Example..........................................................................1 Do

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:29:05
158Technology / Wireless / Cryptographic protocols / IEEE 802.11 / Wi-Fi / Extensible Authentication Protocol / Wireless security / Wi-Fi Protected Access / Wpa supplicant / Wireless networking / Computer network security / Computing

Cisco − WPA Configuration Overview Table of Contents WPA Configuration Overview...........................................................................................................................1 To get Cisco

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:29:06
159Internet / Email authentication / Email / Internet protocols / Email spam / Whitelist / DomainKeys Identified Mail / DMARC / Spam / Spamming / Spam filtering / Computing

PDF Document

Add to Reading List

Source URL: www.trustsphere.com

Language: English - Date: 2014-04-11 00:50:06
160Internet / Security / RADIUS / Access control / Network access server / Authentication / JavaScript / Computing / Internet protocols / Internet standards

PDF Document

Add to Reading List

Source URL: portaone.com

Language: English - Date: 2015-03-25 06:50:30
UPDATE