Authentication protocols

Results: 771



#Item
191Cryptographic protocols / Yahoo! / Computing / Spamming / Computer-mediated communication / DomainKeys Identified Mail / DomainKeys / Sendmail / Phishing / Email authentication / Spam filtering / Email

FAQ DomainKeys Identified Mail (DKIM) Frequently Asked Questions WHAT IS DOMAINKEYS IDENTIFIED MAIL?

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2007-11-06 18:48:17
192Virtual reality / Gesture / Password / Computing / Authentication / Internet protocols / Security / User interface techniques

ShakeOnIt: An Exploration Into Leveraging Social Rituals For Information Access David Cranor, Amanda Peyton, Arlene Persaud, Rajiv Bhatia, Sinbae Kim, and V. M. Bove MIT Media Lab MIT Sloan Harvard GSD

Add to Reading List

Source URL: excedrin.media.mit.edu

Language: English - Date: 2013-07-01 08:09:55
193Cryptographic protocols / Digest access authentication / Request for Comments / Basic access authentication / Concurrent Versions System / Apache HTTP Server / 2.0 / Software / HTTP / Computing

Authentication in Apache HTTP Server 2.1 Justin R. Erenkrantz University of California, Irvine Slides: http://www.erenkrantz.com/oscon/

Add to Reading List

Source URL: www.erenkrantz.com

Language: English - Date: 2010-08-20 02:52:00
194Computer security / Computing / Internet privacy / Phishing / Social engineering / Spamming / Mutual authentication / Cross-site scripting / HTTP cookie / HTTP / Cryptographic protocols / Cybercrime

Secure Browsing Mode Version 1.2, 27 June 2006 Ivan Ristic () Introduction It is widely accepted today that web applications are inherently insecure. A lot of energy was

Add to Reading List

Source URL: blog.ivanristic.com

Language: English - Date: 2013-02-15 05:44:28
195Network architecture / Internet standards / Telnet / Password / Secure Shell / SAINT / Transmission Control Protocol / File Transfer Protocol / Basic access authentication / Computing / Internet / Internet protocols

ABC Coffee ASV Vulnerability Details Report Generated: April 18, 2014 Part 1. Scan Information Scan Customer Company: ABC Coffee Shop Date scan was completed: April 17, 2014

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2014-04-22 13:49:11
196Cryptographic protocols / Yahoo! / Computing / Spamming / Computer-mediated communication / DomainKeys Identified Mail / DomainKeys / Sendmail / Phishing / Email authentication / Spam filtering / Email

FAQ DomainKeys Identified Mail (DKIM) Frequently Asked Questions WHAT IS DOMAINKEYS IDENTIFIED MAIL?

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2007-11-06 18:48:17
197Network protocols / Cryptographic protocols / IPv6 / Internet Protocol / Tunneling protocols / Mobile IP / Proxy Mobile IPv6 / IPsec / Internet Key Exchange / Network architecture / Computing / Data

Child-proof Authentication for MIPv6 (CAM) Michael Roe Greg O’Shea Microsoft Research Ltd St George House, 1 Guildhall Street

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:35
198Semantic Web / Cryptographic protocols / Secure communication / FOAF / HTTP Secure / Transport Layer Security / Named graph / X.509 / Public key infrastructure / Cryptography / Public-key cryptography / Key management

FOAF+SSL: RESTful Authentication for the Social Web? Henry Story1 , Bruno Harbulot2 , Ian Jacobi3 , and Mike Jones2 1 2

Add to Reading List

Source URL: bblfish.net

Language: English - Date: 2010-06-27 11:37:24
199Cryptography / Challenge-response authentication / IP / Alice and Bob / Baseband / Modulation / Channel / Distance-bounding protocol / Cryptographic protocols / Information / Data

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System ˇ Aanjhan Ranganathan1 , Nils Ole Tippenhauer1 , Boris Skori´ c2 , Dave Singel´ee3 , 1

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2013-03-16 15:45:20
200Email / Computing / Computer-mediated communication / DMARC / Cryptographic protocols / DomainKeys Identified Mail / Phishing / Internet security / Anti-spam techniques / Spam filtering / Email authentication / Spamming

DMARC Phishing attacks continue to be one of the top Internet security threats, costing companies and individuals billions of dollars every year. Enter DMARC.

Add to Reading List

Source URL: returnpath.com

Language: English - Date: 2015-02-20 11:17:07
UPDATE