Authentication protocols

Results: 771



#Item
271Internet protocols / Security token / Two-factor authentication / One-time password / Software token / Internet standards / HOTP / Password / Authentication / Security / Computer security / Access control

Ocean Media secures remote access with Celestix HOTPin CHALLENGE Secure existing remote access using two-factor authentication for compliance and enhanced security.

Add to Reading List

Source URL: www.e92plus.com

Language: English - Date: 2014-01-28 09:10:24
272Cryptographic software / Secure Shell / OpenSSH / Password / Challenge-response authentication / Internet protocols / Internet standards / Computer network security / Ssh-keygen / System software / Software / Computing

The paper begins on the next page. Before you begin reading, we have a request... Please Help Make This Study Better. Take Part by Contributing Data! The data in our study is collected by a script that has been carefully

Add to Reading List

Source URL: nms.csail.mit.edu

Language: English - Date: 2005-06-21 15:53:34
273Diffie–Hellman key exchange / Secure Remote Password protocol / Encrypted key exchange / Public-key cryptography / Internet Key Exchange / Salt / SPEKE / Password-authenticated key agreement / Cryptographic protocols / Cryptography / Password

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
274Cryptographic protocols / Windows XP / Wi-Fi / Protected Extensible Authentication Protocol / Technology / Wireless / IEEE 802.11i-2004 / Wireless security / Comparison of wireless LAN clients / Computing / Wireless networking / Computer network security

Tech Support Connecting to SWTAFE Student Wireless Network : Windows XP This document is designed as a guide for personal/home notebooks that are not owned by SWTAFE to assist in connecting to the SWTAFE Wireless networ

Add to Reading List

Source URL: www.swtafe.vic.edu.au

Language: English
275Internet standards / Information / Wireless networking / Xirrus / Computer network security / Networking hardware / Extensible Authentication Protocol / IEEE 802.11 / RADIUS / Computing / Data / Internet protocols

Xirrus XR-320 Wall-mounted 802.11ac AP With Gigabit PoE Switch PRODUCT DATASHEET Introducing the Xirrus XR-320

Add to Reading List

Source URL: www.e92plus.com

Language: English - Date: 2015-02-05 05:38:00
276Internet / Network architecture / Network management / Wireless networking / Xirrus / Computer network security / RADIUS / Extensible Authentication Protocol / IEEE 802.11ac / Computing / Internet protocols / Internet standards

Xirrus XR-630 Wireless Access Point D ATA S HEET 802.11ac AP Performance Optimized with ACExpress™

Add to Reading List

Source URL: www.brainworks.de

Language: English - Date: 2014-11-25 10:38:09
277Cryptographic protocols / HTTP / Internet protocols / Spring Security / Cross-site request forgery / Lightweight Directory Access Protocol / Java Authentication and Authorization Service / Authentication / WebSocket / Computing / Java enterprise platform / Directory services

Spring Security Reference

Add to Reading List

Source URL: docs.spring.io

Language: English - Date: 2015-03-25 23:19:32
278Internet protocols / Security token / One-time password / HOTP / Two-factor authentication / Access token / RADIUS / Citrix Systems / SecurID / Computing / Security / Computer security

Celestix_datasheet_template_hotpin_1

Add to Reading List

Source URL: www.e92plus.com

Language: English - Date: 2014-01-28 09:10:19
279Email / Computer-mediated communication / Cryptographic protocols / Spamming / MDaemon / Sender Policy Framework / DomainKeys Identified Mail / DMARC / SMTP Authentication / Email authentication / Spam filtering / Computing

MDaemon Messaging Server - Email Server Settings - How To Best Practice Guide

Add to Reading List

Source URL: static.altn.com

Language: English - Date: 2015-03-31 12:24:08
280World Wide Web / OAuth / Twitter / Technology / Social login / Computing / Cloud standards / Internet protocols

POINTROLL Twitter has implemented a new authentication process leveraging OAuth. When the creative needs to "push" to Twitter (i.e. tweeting or following from the ad), OAuth must be used. Using OAuth means that authenti

Add to Reading List

Source URL: www.pointroll.com

Language: English - Date: 2015-03-16 15:26:51
UPDATE