Authentication protocols

Results: 771



#Item
241Internet protocols / Network protocols / Tunneling protocols / Computer network security / Point-to-Point Tunneling Protocol / Internet standards / LM hash / Microsoft Point-to-Point Encryption / Password authentication protocol / Computing / Data / Network architecture

Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP) Bruce Schneier Counterpane Systems, 101 East Minnehaha Parkway,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
242Data / IEEE 802.1X / Information / Internet protocols / Internet standards / Extensible Authentication Protocol / RADIUS / Authenticator / Computing / Computer network security / Wireless networking

Network Working Group Request for Comments: 4137 Category: Informational J. Vollbrecht Meetinghouse Data Communications

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2005-08-18 19:01:31
243Computer security / MS-CHAP / LM hash / Point-to-Point Tunneling Protocol / Password / Authentication protocol / Challenge-response authentication / NTLM / Cryptographic hash function / Cryptography / Computing / Internet protocols

Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Bruce Schneier Mudge Counterpane Systems L0pht Heavy Industries

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
244Secure communication / Cryptographic protocols / HTTP / Electronic commerce / Java platform / Digest access authentication / HTTP Secure / Certificate authority / Cross-site scripting / Cryptography / Security / Computing

Securing Java Web Applications This advanced course shows experienced developers of Java web applications how to secure those applications and to apply best practices with regard to secure enterprise coding. Authenticat

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-12-29 13:10:38
245Internet / Data / RADIUS / Computer network security / Transmission Control Protocol / Extensible Authentication Protocol / Security Assertion Markup Language / Firewall / Diameter / Computing / Internet protocols / Internet standards

Internet Engineering Task Force (IETF) Request for Comments: 7499 Category: Experimental ISSN: A. Perez-Mendez, Ed.

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-04-06 16:44:02
246Data / IEEE 802.1X / Internet protocols / Information / Internet standards / Extensible Authentication Protocol / RADIUS / Authenticator / Computing / Computer network security / Wireless networking

Network Working Group Request for Comments: 4137 Category: Informational J. Vollbrecht Meetinghouse Data Communications

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2005-09-07 12:32:45
247Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Multi-party Off-the-Record Messaging Ian Goldberg ˘ Berkant Ustaoglu

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-08-01 14:09:59
248Cryptographic protocols / Technology / Cryptography / IEEE 802.11 / Wi-Fi / Extensible Authentication Protocol / IEEE 802.1X / Wireless security / Wi-Fi Protected Access / Wireless networking / Computing / Computer network security

Microsoft Word - ORiNOCO security paper v2.2.doc

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:22:48
249Email / Computer security / Computing / Cryptographic protocols / DMARC / DomainKeys Identified Mail / Phishing / Anti-spam techniques / Sender Policy Framework / Email authentication / Spam filtering / Spamming

DMARC Providing domain owners control of their brand in the email channel January 2012 DMARC Defined

Add to Reading List

Source URL: dmarc.org

Language: English - Date: 2013-11-07 14:27:51
250Computing / Internet / Email / Cryptographic protocols / DomainKeys Identified Mail / Sender Policy Framework / Phishing / DomainKeys / DMARC / Email authentication / Spam filtering / Spamming

Impacting Policy. Impacting PeoplePENNSYLVANIA AVE., NW SUITE 500 SOUTH WASHINGTON, DCTEL

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:42:14
UPDATE