Authentication protocols

Results: 771



#Item
341Authentication / Password / Secure Shell / Extensible Authentication Protocol / Cryptographic protocols / Cryptography / Security

Verified Contributive Channel Bindings for Compound Authentication Antoine Delignat-Lavaud, Inria Paris Joint work with Karthikeyan Bhargavan and Alfredo Pironti Motivation: Authentication Composition

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2015-03-09 10:28:36
342Electronic engineering / Internet / RADIUS / Videotelephony / Network access server / Access token / H.323 / Authentication / Internet protocols / Computing / Internet standards

PortaSwitch: External System Interfaces Guide MR45

Add to Reading List

Source URL: www.portaone.com

Language: English - Date: 2015-01-23 05:56:49
343Internet / Computing / Internet protocols / Internet standards / HTTP / HTTP Secure / HTTP cookie / Man-in-the-middle attack / Certificate authority / Cryptography / Cryptographic protocols / Secure communication

Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web Michael Dietz Rice University Alexei Czeskis

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-03-21 17:06:14
344Wireless networking / Signaling System 7 / Cryptographic protocols / Computer network security / EAP-SIM / Extensible Authentication Protocol / IEEE 802.1X / Mobile Application Part / Subscriber identity module / Computing / Telephony / Information

Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly.

Add to Reading List

Source URL: interlinknetworks.com

Language: English - Date: 2012-02-18 13:52:53
345Computer network security / IEEE 802.11 / Computing / Technology / Wi-Fi Protected Access / IEEE 802.11i-2004 / Wireless security / Extensible Authentication Protocol / Wired Equivalent Privacy / Cryptography / Wireless networking / Cryptographic protocols

Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2) Paul Arana INFS 612 – Fall 2006 Abstract With the increase in use of Wireless Networks, the

Add to Reading List

Source URL: cs.gmu.edu

Language: English - Date: 2006-11-29 23:32:26
346Information / Public-key cryptography / Electronic commerce / Secure communication / PKCS / Smart card / Communications protocol / Secure Electronic Transaction / Deniable authentication / Cryptography / Cryptographic protocols / Data

Making Sense of Specifications: the Formalization of SET (Extended Abstract) Giampaolo Bella1 , Fabio Massacci2,3 , Lawrence C. Paulson1 , and Piero Tramontano3 1

Add to Reading List

Source URL: www.ing.unitn.it

Language: English - Date: 2004-10-19 21:06:10
347Security / 3-D Secure / Authentication / CyberSource / Merchant services / Cryptographic protocols

Title Page CyberSource Payer Authentication Using the SCMP API December 2014

Add to Reading List

Source URL: apps.cybersource.com

Language: English - Date: 2014-12-10 12:49:59
348Internet protocols / Internet standards / Email / Electronic commerce / File Transfer Protocol / Electronic business / Electronic Signatures in Global and National Commerce Act / Authentication / Internet / Computing / Network architecture

April 24, 2002 Mr. Alan Siu Deputy Secretary Information Technology and Broadcasting

Add to Reading List

Source URL: www.hkispa.org.hk

Language: English - Date: 2012-05-10 06:27:47
349Computer security / Cryptographic protocols / Code division multiple access / Two-factor authentication / Authentication / Subscriber identity module / ISO/IEC / AKA / Security / Cryptography / Smart cards

PLAID application specification License Version 7.1 Contents PLAID application specification 1 License Version 7.1 1 1. Introduction 3

Add to Reading List

Source URL: www.humanservices.gov.au

Language: English - Date: 2015-01-15 19:42:42
350Identity management / One-time password / Authentication / Password / Electronic authentication / Internet protocols / Two-factor authentication / Security token / Security / Computer security / Access control

11_common_auth_methods_eng

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:19
UPDATE