Authentication protocols

Results: 771



#Item
301Technology / Cryptographic protocols / Data / IEEE 802.1X / IEEE 802.11 / IEEE 802 / Extensible Authentication Protocol / Wireless security / IEEE 802.11i-2004 / Computer network security / Wireless networking / Computing

White Paper Introduction to 802.1X for Wireless LANs Abstract Wireless networking (Wi-Fi) has presented a significant security challenge over the past few years. This paper looks at the fundamentals on how the IEEE

Add to Reading List

Source URL: www.interlinknetworks.com

Language: English - Date: 2013-01-24 16:33:25
302RADIUS / Internet / Windows Server / Server / Network architecture / Computer network security / Internet Authentication Service / Computing / Internet protocols / Internet standards

RADIUS Software Developer’s Toolkit – v7.3 Interlink Networks’ RADIUS Software Developer’s Toolkit provides a set of easy-toimplement and modular tools to help you extend the capabilities of your Interlink Networ

Add to Reading List

Source URL: www.interlinknetworks.com

Language: English - Date: 2012-02-18 13:53:24
303Ciphertext / Known-plaintext attack / Cryptographic protocols / RSA / Weak key / Kerberos / Initialization vector / Challenge-response authentication / Cryptography / Public-key cryptography / Password

© ACM, 1989. This is the authorsʼ version of the work, posted by permission of ACM. http://doi.acm.org[removed]74853 Reducing Risks from Poorly Chosen Keys T. Mark A. Lomas, Li Gong, Jerome H. Saltzery, Roger M.

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:06:38
304Public-key cryptography / Internet standards / Key management / Email authentication / S/MIME / X.509 / Certificate Management Protocol / Certificate policy / Public key infrastructure / Cryptography / Computing / Cryptographic protocols

S/MIME - great idea, pity about the implementation

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:50:57
305Data / Network architecture / Internet standards / TACACS / RADIUS / Cisco IOS / Password / Kerberos / Basic access authentication / Computing / Internet protocols / Computer network security

C H A P TER 4 Access Service Security The access service security paradigm presented in this guide uses the authentication, authorization,

Add to Reading List

Source URL: www.extraxi.com

Language: English - Date: 2009-05-29 07:47:02
306Computer network security / Key management / Kerberos / Generic Security Services Application Program Interface / Single sign-on / Ticket Granting Ticket / Key distribution center / Cryptographic protocols / Generic Security Service Algorithm for Secret Key Transaction / Computer security / Computing / Cryptography

Simplify enterprise Java authentication with single sign-on Design secure client/server Java applications that use GSS-API and Kerberos tickets to implement SSO Faheem Khan ([removed]) Consultant

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2013-09-18 06:43:11
307Cryptographic protocols / Technology / IEEE 802.11 / Wireless / Wireless security / IEEE 802.11i-2004 / IEEE 802.1X / Extensible Authentication Protocol / Wireless LAN / Wireless networking / Computer network security / Computing

Wireless LAN Access Control and Authentication 802.11b Wireless Networking and Why It Needs Authentication

Add to Reading List

Source URL: www.interlinknetworks.com

Language: English - Date: 2012-02-18 13:55:27
308Access control / Advanced Encryption Standard / EMC Corporation / SecurID / Identity management / Security token / RADIUS / Two-factor authentication / Network access server / Security / Computer security / Internet protocols

Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor

Add to Reading List

Source URL: www.interlinknetworks.com

Language: English - Date: 2012-02-18 13:52:55
309Routing / Computer network security / Cryptographic protocols / Internet protocols / IPsec / IP address / Subnetwork / Virtual private network / Gateway / Network architecture / Computing / Internet

Interoperability Profile for ZyXEL SBG3300 Scenario 1: Gateway-to-Gateway with Preshared Secrets (Basic Interoperability) The following is a typical gateway-to-gateway VPN that uses a preshared secret for authentication.

Add to Reading List

Source URL: www.vpnc.org

Language: English - Date: 2013-08-19 22:42:42
310Computer security / Internet standards / Code division multiple access / Computer network security / Cryptographic protocols / AAA protocol / RADIUS / OAuth / Kerberos / Computing / Internet protocols / Internet

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Add to Reading List

Source URL: www6.ietf.org

Language: English - Date: 2014-03-02 06:27:58
UPDATE