Authentication protocols

Results: 771



#Item
311Network architecture / Internet / Logical Link Control / Modems / Point-to-point protocol / Internet Protocol Control Protocol / Link control protocol / Tunneling protocols / Password authentication protocol / Internet protocols / Computing / Internet standards

unicoi_logo_white_no_shadow[removed])

Add to Reading List

Source URL: www.unicoi.com

Language: English - Date: 2013-04-09 14:38:44
312NTLM / HTTP / Keychain / Cyberwarfare / Password / Cryptographic protocols / Internet protocols / Digest access authentication / Basic access authentication / Computer security / Computer network security / Computing

Request starts Are we allowed to present authentication credentials to the

Add to Reading List

Source URL: allseeing-i.com

Language: English - Date: 2009-11-02 09:44:15
313Computer network security / Internet protocols / Federated identity / Single sign-on / Directory services / Internet standards / Integrated Windows Authentication / Password / Secure Shell / Computer security / Computing / Security

Lorikeet – Integrated Authentication Who am I? ●

Add to Reading List

Source URL: www.openldap.org

Language: English - Date: 2014-09-29 17:45:14
314Computer network security / Cryptographic protocols / Internet standards / HTTP / Generic Security Services Application Program Interface / Integrated Windows Authentication / SPNEGO / Kerberos / Basic access authentication / Computing / Computer security / Security

External Identity and Authentication Providers For Apache HTTP Server Jan Pazdziora Principal Software Engineer Identity Management Engineering, Red Hat

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-11-14 03:08:22
315Data / Cryptographic protocols / Internet protocols / Digest access authentication / Request for Comments / Computer network security / Basic access authentication / Cryptographic nonce / Challenge-response authentication / Computing / HTTP / Internet

HTTP Authentication: Basic and Digest Access Authentication

Add to Reading List

Source URL: www.webdav.org

Language: English - Date: 2009-01-01 11:06:40
316Bluetooth / Wireless / Key-agreement protocol / Authentication / Man-in-the-middle attack / Advanced Encryption Standard / Cryptography / Technology / Cryptographic protocols

Bypassing Passkey Authentication in Bluetooth Low Energy (extended abstract) Tomáš Rosa [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-23 07:35:21
317Password / Key management / Challenge-response authentication / Needham–Schroeder protocol / Known-plaintext attack / Kerberos / Key / RSA / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:11:55
318Internet protocols / Information / Computer network security / Internet standards / Cryptographic protocols / Protected Extensible Authentication Protocol / IEEE 802.1X / Extensible Authentication Protocol / RADIUS / Computing / Wireless networking / Data

Microsoft Word - PEAP-TTLS_Application_Note_1022203.doc

Add to Reading List

Source URL: www.interlinknetworks.com

Language: English - Date: 2012-02-18 13:53:12
319Internet governance / Internet protocols / Internet Engineering Steering Group / Email authentication / Spam filtering / Internet Engineering Task Force / Internet Draft / NETCONF / Multicast / Internet / Computing / Internet standards

Version 03 Updated[removed]Prague Time March 27 – April 1, 2011 Hosted by:

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2011-03-28 08:01:47
320Certificate authorities / Comodo Group / Cryptographic protocols / Public key infrastructure / X.509 / Two-factor authentication / Public key certificate / Authentication / Phishing / Cryptography / Public-key cryptography / Key management

Comodo Custom Client Certificates Highly Secure Authentication of Customers and Employees www.instantssl.com [removed]

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-10-06 14:46:00
UPDATE