Authentication protocols

Results: 771



#Item
11802.1x/EAP Authentication Guide RadiusNT/X V5.1 IEA Software, Inc. Administrative and Support Office PO BOX 1170

802.1x/EAP Authentication Guide RadiusNT/X V5.1 IEA Software, Inc. Administrative and Support Office PO BOX 1170

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2013-02-15 13:27:42
12IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
13Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2)  Definition of zero-knowledge (ZK)

Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2) Definition of zero-knowledge (ZK)

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-03-06 05:37:28
14GNU SASL Simple Authentication and Security Layer for the GNU system for version 1.7.0, 22 October 2010 Simon Josefsson

GNU SASL Simple Authentication and Security Layer for the GNU system for version 1.7.0, 22 October 2010 Simon Josefsson

Add to Reading List

Source URL: josefsson.org

Language: English - Date: 2015-08-11 16:46:22
15Server-driven Outbound Web-application Sandboxing  FP7-ICT, Project Nohttps://www.websand.eu  Deliverable D1.1

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D1.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:48
16General Terms and Conditions of Business of GSN Global Signature Net AG (

General Terms and Conditions of Business of GSN Global Signature Net AG ("SignatureNet") for Data Storage for Issuing Banks ("GTCs issuing banks") 1 Coverage

Add to Reading List

Source URL: www.signaturenet.org

Language: English - Date: 2012-01-02 01:48:36
17Computing / Cryptography / Wireless networking / Computer security / Cryptographic protocols / IEEE 802.11u / Computer network security / Extensible Authentication Protocol / IEEE 802.11 / Authentication

November 2007 doc.: IEEE2786r0 IEEE P802.11 Wireless LANs Liaison from IETF EMU to IEEEDate:

Add to Reading List

Source URL: mentor.ieee.org

Language: English - Date: 2011-06-28 18:39:10
18Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
19DOE Grids CA Certificate Policy and Certification Practice Statement

DOE Grids CA Certificate Policy and Certification Practice Statement

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2008-09-03 15:39:00
20Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

Add to Reading List

Source URL: www.e7n.ch

Language: English