Authentication protocols

Results: 771



#Item
361Wireless / Computer network security / Universal Mobile Telecommunications System / Internet protocols / Cryptographic protocols / Extensible Authentication Protocol / IEEE 802.1X / Wireless LAN / AKA / Technology / Wireless networking / Computing

Transparent End-User Authentication Across Heterogeneous Wireless Networks Hong Chen Miroslav Živković, Dirk-Jaap Plas

Add to Reading List

Source URL: doc.utwente.nl

Language: English - Date: 2011-08-28 10:53:03
362Cryptography / Wireless networking / Cryptographic protocols / Internet protocols / Extensible Authentication Protocol / Kerberos / Wireless security / IEEE 802.11i-2004 / IEEE 802.1X / Computer network security / Computing / Computer security

A Survey of WPA and 802.11i RSN Authentication Protocols Kwang-Hyun Baek, Sean W. Smith, David Kotz Dartmouth College Computer Science∗ Technial Report TR2004-524 November 2004

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2013-12-23 16:47:09
363Generic Security Services Application Program Interface / Computer security / Kerberos / Cryptographic protocols / PKCS11 / Solaris / Oracle Database / Oracle Corporation / Simple Authentication and Security Layer / Computing / Internet standards / Software

Developer's Guide to Oracle Solaris Security

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2012-07-18 06:47:18
364Internet / Technology / Diameter Credit-Control Application / Diameter / RADIUS / IP Multimedia Subsystem / Oracle Database / Oracle Corporation / Extensible Authentication Protocol / Computing / Internet protocols / Internet standards

Oracle Communications Service Broker Online Mediation Controller Protocol Implementation Conformance Statement

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2014-05-05 01:53:09
365Internet protocols / Internet standards / Cryptography standards / XKMS / X.509 / Delegated Path Discovery / Lightweight Directory Access Protocol / PKCS / Authentication / Cryptography / Cryptographic protocols / Public-key cryptography

7 May 7, 2003 Comments from Denis Pinkas ([removed]) on XKMS Version 2 (April 18, 2003)

Add to Reading List

Source URL: lists.w3.org

Language: English - Date: 2015-01-11 00:16:59
366Information / Communications protocol / Burrows–Abadi–Needham logic / Key-agreement protocol / Authentication protocol / Dolev-Yao model / Protocol / Public-key cryptography / Station-to-Station protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis Catherine Meadows

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-26 15:14:05
367Computer network security / XKMS / Information / Cryptographic nonce / Challenge-response authentication / Replay attack / Cryptographic protocols / Cryptography / Cyberwarfare

CHAPTER 5. SECURITY CONSIDERATIONS 34 service because the Web service only knows this secret key: nonce = time + serial number + M AC(time + serial number, secret key)

Add to Reading List

Source URL: lists.w3.org

Language: English - Date: 2015-01-08 21:59:19
368Information / Challenge-response authentication / Password authentication protocol / Public-key cryptography / Cryptographic nonce / Needham–Schroeder protocol / Otway–Rees protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]Environmental Requirements for Authentication Protocols Ran Canetti1 and Catherine Meadows2 and Paul Syverson2 1

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 10:13:46
369Java platform / Directory services / Federated identity / OpenSSO / Internet protocols / Oracle Corporation / Authentication / Security token / Lightweight Directory Access Protocol / Computing / Software / Java enterprise platform

Oracle OpenSSO Security Token Server Administration Guide

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2010-08-13 18:28:40
370Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Public-key cryptography / Cryptographic nonce / XTR / Deniable authentication / Security protocol notation / Wide Mouth Frog protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]The Logic of Authentication Protocols ?

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:09:46
UPDATE