Authentication protocols

Results: 771



#Item
231Data / Cryptographic protocols / Internet protocols / Digest access authentication / Request for Comments / Internet standards / Basic access authentication / Authentication / Hypertext Transfer Protocol / Computing / HTTP / Internet

Internet Engineering Task Force (IETF) Request for Comments: 7235 Obsoletes: 2616 Updates: 2617 Category: Standards Track ISSN:

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-06-06 21:15:27
232Cryptography / Cryptographic protocols / Cryptographic software / Computer network security / Password / Security / Computer security

Microsoft Word - Comments of an efficient and secure multi-server authentication scheme with key agreement.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-01 21:27:53
233

Comments on two multi-server authentication protocols *Yalin Chen 1, Chun-Hui Huang 2, Jue-Sam Chou 3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-28 20:05:25
    234Cryptographic protocols / Finite fields / Modular arithmetic / Direct Anonymous Attestation / Trusted Platform Module / Trusted Computing Group / Trusted Computing / XTR / RSA / Cryptography / Abstract algebra / Public-key cryptography

    An Anonymous Authentication Scheme for Trusted Computing Platform He Ge ⋆⋆

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-12-06 15:19:54
    235Email / Computer security / Spamming / Cryptographic protocols / DomainKeys Identified Mail / Sender Policy Framework / Anti-spam techniques / Barry Leiba / DomainKeys / Spam filtering / Email authentication / Computing

    www.computer.org/internet computing An Introduction to Internet Standards Barry Leiba Vol. 12, No. 1

    Add to Reading List

    Source URL: internetmessagingtechnology.org

    Language: English - Date: 2012-03-08 10:28:00
    236OAuth / Security / Computer security / Cross-platform software / Web 2.0 / Gmail / Identity management / Authentication / Twitter / Computing / Cloud standards / Internet protocols

    www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1

    Add to Reading List

    Source URL: internetmessagingtechnology.org

    Language: English - Date: 2012-03-08 10:27:55
    237Pluggable authentication module / Radmin / Internet protocols / Internet standards / BoKS / Common Authentication Service Adapter / System software / Computing / Software

    Using PAM with Radmind VersionThis document describes how to configure and use pluggable authentication modules (PAM) for the radmind server on Mac OS 10.2 and higher. Creating the Radmind PAM Configuration File

    Add to Reading List

    Source URL: rsug.itd.umich.edu

    Language: English - Date: 2005-08-18 16:57:38
    238Information / Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / Burrows–Abadi–Needham logic / Communications protocol / Public-key cryptography / Transmission Control Protocol / Otway–Rees protocol / Cryptographic protocols / Data / Cryptography

    A General Approach to the Verification of Cryptographic Protocols using Answer Set Programming James P. Delgrande, Torsten Grote, and Aaron Hunter School of Computing Science, Simon Fraser University,

    Add to Reading List

    Source URL: www.cs.sfu.ca

    Language: English - Date: 2010-05-31 18:50:51
    239Internet privacy / Cryptographic software / Off-the-Record Messaging / Diffie–Hellman key exchange / Key exchange / Man-in-the-middle attack / Deniable authentication / Digital signature / SecureIM / Cryptography / Cryptographic protocols / Public-key cryptography

    Off-the-Record Communication, or, Why Not To Use PGP Nikita Borisov UC Berkeley Ian Goldberg

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2004-12-12 23:04:41
    240Computing / Computer network security / Data / IEEE 802.11 / Secure communication / IEEE 802.11i-2004 / IEEE 802.1X / Wireless security / Extensible Authentication Protocol / Cryptography / Cryptographic protocols / Wireless networking

    Microsoft Word - NDSS05.doc

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2005-06-17 01:35:04
    UPDATE