Authentication protocols

Results: 771



#Item
161Security / HTTP / Cryptography / Computer network security / Digest access authentication / Request for Comments / HTTP cookie / Challenge-response authentication / AKA / Cryptographic protocols / Computing / Computer security

PDF Document

Add to Reading List

Source URL: vsecurity.com

Language: English - Date: 2015-03-16 15:49:48
162HTTP / Computer security / Secure communication / Internet protocols / Internet standards / Basic access authentication / Form-based authentication / Digest access authentication / Transport Layer Security / Security / Computing / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2011-10-24 10:56:35
163System software / OSI protocols / Citrix Systems / Password / Secure Shell / Remote access / Two-factor authentication / HTTP cookie / Challenge-response authentication / Remote desktop / Computing / GoToMyPC

PDF Document

Add to Reading List

Source URL: l1.osdimg.com

Language: English - Date: 2014-11-20 14:31:22
164JavaScript / Software engineering / Computer programming / Internet standards / Internet protocols / HTTP / Digest access authentication / Computing / MD5 / Password

PDF Document

Add to Reading List

Source URL: www.mydocsonline.com

Language: English - Date: 2014-06-30 15:49:10
165Cryptographic protocols / Internet protocols / Open standards / Simple Authentication and Security Layer / Advanced Message Queuing Protocol / Apache Qpid / CRAM-MD5 / Password / Integrated Windows Authentication / Computing / Message-oriented middleware / Internet standards

PDF Document

Add to Reading List

Source URL: labs.mwrinfosecurity.com

Language: English - Date: 2015-05-22 06:07:51
166Cryptographic protocols / Internet privacy / Secure communication / .onion / Transport Layer Security / Certificate authority / Tor / Web of trust / HTTP Secure / Cryptography / Public-key cryptography / Key management

Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication Paul Syverson Griffin Boyce

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:01:25
167Internet protocols / Internet standards / RADIUS / Password / SMS / Authentication / Multi-factor authentication / Security / Technology / Computing

Configuring Juniper Radius authentication for SMS PASSCODE® © SMS PASSCODE® 2015 Configuring Juniper Radius authentication for SMS PASSCODE®

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2015-01-09 05:12:09
168Directory services / Java platform / Java enterprise platform / Lightweight Directory Access Protocol / Apache ActiveMQ / Java Authentication and Authorization Service / Password / Streaming Text Oriented Messaging Protocol / Computing / Internet protocols / Message-oriented middleware

PDF Document

Add to Reading List

Source URL: labs.mwrinfosecurity.com

Language: English - Date: 2015-05-22 06:07:59
169Cryptographic protocols / Software / Computing / Bitcoin / Peer-to-peer computing / Credential / Direct Anonymous Attestation / Authentication / Proof of knowledge / Cryptography / Identity management / Security

Decentralized Anonymous Credentials Christina Garman, Matthew Green, Ian Miers The Johns Hopkins University Department of Computer Science, Baltimore, USA {cgarman, mgreen, imiers}@cs.jhu.edu Abstract—Anonymous credent

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2014-02-05 02:15:01
170Internet protocols / Data / Cryptographic software / Computer network security / Skype / Password / Extensible Authentication Protocol / RADIUS / Two-factor authentication / Computing / Internet standards / Internet

S HAR EPLAN T E C HN I CA L SPEC IFICATIO N S Security

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-04-27 09:38:13
UPDATE