Authentication protocols

Results: 771



#Item
281Cyberwarfare / Kerberos / Ticket / Challenge-response authentication / Alice and Bob / Key distribution center / Public-key cryptography / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Cryptography / Computer network security / Cryptographic protocols

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2005-12-06 23:10:45
282Cryptographic protocols / Electronic commerce / Certificate policy / PKCS / X.509 / S/MIME / Windows / Key / Public key certificate / Cryptography / Public-key cryptography / Key management

DAS adds role-based authentication and ‘community of interest’ confidentiality to all X.509-based security-enabled applications OVERVIEW ISC’s Document Access Servlet (DAS) is a customer-hosted web service that per

Add to Reading List

Source URL: www.infoseccorp.com

Language: English - Date: 2013-07-26 13:46:04
283Cryptographic protocols / HTTP / Internet protocols / Internet standards / Basic access authentication / Cryptographic nonce / Challenge-response authentication / Transport Layer Security / One-time password / Computing / Security / Data

Internet Engineering Task Force (IETF) Request for Comments: 7486 Category: Experimental ISSN: [removed]S. Farrell

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-03-10 20:46:32
284Computer network security / Information / Tunneling protocols / Internet protocols / Internet privacy / IPsec / Virtual private network / Two-factor authentication / Internet Key Exchange / Cryptographic protocols / Computing / Data

Mobile Security DigiSAFE MobileCrypt VPN Features and Benefits Secure Connection

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 02:03:57
285Spamming / Computing / Computer-mediated communication / Cryptographic protocols / Sender Policy Framework / DomainKeys Identified Mail / Anti-spam techniques / Simple Mail Transfer Protocol / Greylisting / Spam filtering / Email authentication / Email

An overview of the Sender Policy Framework (SPF) as an antiphishing mechanism Stefan Görling Royal Institute of Technology, Stockholm, Sweden Autobiographical note Stefan Görling is a doctoral researcher at the departm

Add to Reading List

Source URL: www.gorling.se

Language: English - Date: 2007-04-16 04:46:17
286Information / Internet Key Exchange / IPsec / Internet Security Association and Key Management Protocol / Security association / Oakley protocol / Internet security / Extensible Authentication Protocol / NAT traversal / Cryptographic protocols / Cryptography / Data

Fusion Embedded™ IKE Fusion Internet Key Exchange is an Internet Protocol security (IPsec) standard protocol used to ensure security for VPN negotiation and remote host or network access. It provides an automatic means

Add to Reading List

Source URL: www.unicoi.com

Language: English - Date: 2013-12-06 14:49:14
287Internet protocols / HTTP / Two-factor authentication / Authentication / Password / Access token / Basic access authentication / One-time password / Security token / Security / Computer security / Access control

ePass OTP Authentication System White Paper ePass OTP Authentication System White Paper

Add to Reading List

Source URL: www.rs-computer.com

Language: English - Date: 2009-12-15 09:43:31
288Network performance / Computer networking / Packet switching / Goodput / Ingress router / Throughput / Router / Transmission Control Protocol / Routing protocols / Computing / Network architecture / Data

Lightweight Source Authentication and Path Validation Tiffany Hyun-Jin Kim Cristina Basescu Limin Jia

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
289Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / HTTP Secure / Transmission Control Protocol / FTPS / Secure communication / Cryptographic protocols / Computing

Fusion Embedded™ SSL Unicoi Systems’ Fusion Secure Socket Layer (SSL) and Transport Layer Security (TLS) provides powerful endpoint authentication, protecting against eavesdropping, message falsification and interfer

Add to Reading List

Source URL: www.unicoi.com

Language: English - Date: 2013-12-06 14:42:57
290HTTP / Internet protocols / Internet standards / Cross-platform software / Internet privacy / RADIUS / Basic access authentication / HTTP 403 / Apache HTTP Server / Computing / Internet / Software

[removed]CH13[removed]:30 PM

Add to Reading List

Source URL: www.modperlcookbook.org

Language: English - Date: 2009-05-24 12:11:08
UPDATE