Authentication protocols

Results: 771



#Item
351ISO standards / Computer security / Cryptographic protocols / Code division multiple access / ISO/IEC / Two-factor authentication / Subscriber identity module / Authentication / Proximity card / Smart cards / Security / Cryptography

Centrelink PLAID version 7 (Nov[removed]Logical SmartCard Application Specification Contents 1. Introduction 2 2. PLAID Authentication Protocol 3 3. COPYRIGHT 4

Add to Reading List

Source URL: www.humanservices.gov.au

Language: English - Date: 2014-12-22 22:54:18
352Identity management / One-time password / Authentication / Password / Electronic authentication / Internet protocols / Two-factor authentication / Security token / Security / Computer security / Access control

11_common_auth_methods_eng

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:20
353Message authentication codes / Cryptographic protocols / Internet security / Secure Shell / Security service / Encryption / Password / Non-repudiation / AKA / Cryptography / Computer network security / Public-key cryptography

Encryption and Security Tutorial Peter Gutmann University of Auckland http://www.cs.auckland.ac.nz/~pgut001 Security Requirements

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2005-10-26 12:55:08
354Spamming / Computer security / Computing / Cryptographic protocols / DMARC / DomainKeys Identified Mail / Sender Policy Framework / Anti-spam techniques / DomainKeys / Spam filtering / Email authentication / Email

Zink-VB2014-renumbered.indd

Add to Reading List

Source URL: www.virusbtn.com

Language: English - Date: 2014-11-06 11:17:39
355KMAC / SHA-2 / CMAC / Computing / Internet protocols / Computer programming / Mathematics / Message authentication codes / Hashing / HMAC

SHA3-based MACs Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop August 22, 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:52:10
356Information / StrongSwan / Extensible Authentication Protocol / Wireless security / Cryptographic protocols / Computing / Data

The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 08:24:10
357Authentication / Notary / Packaging / Authenticity in art / Cryptographic protocols / Security / Cryptography / Access control

This is a post-refereeing final draft. When citing, please refer to the published version: Cohen, E. and Cohen, S.A[removed]Authentication: Hot and Cool. Annals of Tourism Research, 39(3), [removed]DOI: [removed]j.anna

Add to Reading List

Source URL: epubs.surrey.ac.uk

Language: English - Date: 2013-09-23 15:28:16
358Network architecture / StrongSwan / Internet Key Exchange / IPsec / FreeRADIUS / RADIUS / EAP-SIM / Virtual private network / Extensible Authentication Protocol / Cryptographic protocols / Computing / Data

Microsoft PowerPoint - LinuxTag2009_Flyer_VPN_Solution.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2009-06-21 15:09:29
359Computer network security / Internet protocols / Internet standards / Directory services / Password / Lightweight Directory Access Protocol / Integrated Windows Authentication / Single sign-on / Security token / Computer security / Computing / Software

Siebel Security Guide Siebel Innovation Pack 2013 Version[removed]September 2013 Copyright © 2005, 2013 Oracle and/or its affiliates. All rights reserved.

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2013-09-13 05:03:24
360Internet standards / Directory services / Computer network security / Security / Lightweight Directory Access Protocol / Password / Siebel Systems / Integrated Windows Authentication / Single sign-on / Computing / Computer security / Internet protocols

Security Guide for Siebel Business Applications

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2012-04-18 05:17:08
UPDATE