Authentication protocols

Results: 771



#Item
251Computing / Message authentication codes / Password / Ciphertext / Key / Block cipher / Crypt / Secure communication / Transport Layer Security / Cryptography / Cryptographic protocols / Security

CS255: Cryptography and Computer Security Winter 2005 Programming Project #1 Due: Monday, February 7th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-27 23:01:12
252Computer security / Computer network security / Security service / Non-repudiation / Public key infrastructure / Deniable authentication / Plausible deniability / Key-agreement protocol / Information security / Cryptography / Public-key cryptography / Cryptographic protocols

Cryptography and Evidence Michael Roe Clare College A dissertation submitted for the degree of Doctor of Philosophy in the University of Cambridge

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 1999-08-17 09:51:55
253Information / Internet standards / Data transmission / Petroleum production / Separator / Communications protocol / Transmission Control Protocol / Password authentication protocol / Pointer / Computing / Data / Internet protocols

Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis ∗ Juan Caballero∗ , Heng Yin†∗ , Zhenkai Liang∗ , Dawn Song‡∗ Carnegie Mellon University † College of William and Ma

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
254Internet / Data / Internet standards / Password / Transport Layer Security / Digest access authentication / Secure Shell / Computing / Cryptographic protocols / Computer network security

CS255: Introduction to Cryptography Winter 2009 Programming Project #1 Milestone #1 Due Date: Friday, January 21st, 2009.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-01-14 17:24:56
255Computer security / Internet / Cryptographic protocols / Computer network security / CoSign single sign on / SPNEGO / Kerberos / Shibboleth / Lightweight Directory Access Protocol / Internet standards / Federated identity / Computing

Stanford University July 26, 2014 Stanford Web Authentication Overview

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
256Network architecture / Computing / Domain name / Name server / Whois / Domain / IP address / Email authentication / Dnsmasq / Domain name system / Internet / Internet protocols

Your domain names allow you to reach out to your customers, and to target new markets and geographies. However, with so many domain name variations available, how do you know if a third-party is using a confusingly simil

Add to Reading List

Source URL: www.novagraaf.com

Language: English - Date: 2015-03-19 07:58:50
257Cryptography / Computer network security / Technology / IEEE 802.11 / Wi-Fi / Wpa supplicant / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / Wireless networking / Cryptographic protocols / Computing

PROXIM AND WI-FI PROTECTED ACCESS (WPA) What is WPA? As an intermediate WLAN security solution that can be applied to existing WLAN client hardware, the Wi-Fi Alliance has adopted Wi-Fi Protected Access (WPA). Proxim wil

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:22:48
258Security / Internet protocols / Federated identity / Email authentication / Ident / Internet Relay Chat / Authentication server / Single sign-on / Internet Authentication Service / Computer security / Computing / Computer network security

Peer-to-Peer Authentication with a Distributed Single Sign-On Service William Josephson Emin G¨un Sirer

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2004-02-15 16:40:01
259Password / Message authentication code / Key / Crypt / Computer network security / Transport Layer Security / Secure Shell / Cryptography / Cryptographic protocols / Security

CS255: Cryptography and Computer Security Winter 2006 Programming Project #1 Due: Friday, February 10th, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-01 12:20:25
260Directory services / Password / Lightweight Directory Access Protocol / Authentication / Computing / Internet / Security / Internet protocols / Internet standards

Stanford University July 26, 2014 Wallet Secure Data Distribution and Management

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
UPDATE