Authentication protocols

Results: 771



#Item
371Computer security / Security token / HTTP Secure / Password / Authentication / Security / Cryptographic protocols / HTTP

In Carnegie Mellon Computer Science: A 25-Year Commemorative, ed. R. Rashid. ACM Press and Addison-Wesley, 1991, pp[removed]Note: The first printing of this volume had incorrect text due to a production error.) 7 Stro

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:50:43
372Cryptography / IEEE 802.11 / Computing / Technology / Wireless security / Wi-Fi Protected Access / Extensible Authentication Protocol / IEEE 802.11i-2004 / Wired Equivalent Privacy / Cryptographic protocols / Computer network security / Wireless networking

WiFi Protected Access (WPA) Overview - 9 Windows Platform Design Notes Design Information for the Microsoft® Windows® Family of Operating Systems WiFi Protected Access (WPA) Overview

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2005-07-07 14:59:26
373Security token / One-time password / Two-factor authentication / Internet protocols / Computer network security / Multi-factor authentication / Password / Authentication / RADIUS / Security / Computer security / Access control

Token-less OTP Authentication Solutions © 2007 – 2015 SyferLock Technology Corporation™ All Rights Reserved. System and Method U.S. Patent nos. 7,143,440 & 7,725,712 Additional U.S. and Foreign Patents and Patents P

Add to Reading List

Source URL: www.syferlock.com

Language: English - Date: 2015-01-22 10:04:27
374HTTP / Computer security / Computer network security / Secure communication / Internet standards / Transport Layer Security / Digest access authentication / Basic access authentication / Password / Security / Computing / Cryptographic protocols

UNC School of Medicine  Web Publishing Security Policy  Overview  The World Wide Web (WWW) is a key strategic resource for communication, teaching, research  and administration and plays a vita

Add to Reading List

Source URL: www.med.unc.edu

Language: English - Date: 2008-03-24 11:00:55
375Formal languages / Mathematical logic / Cryptographic protocols / Semantics / Burrows–Abadi–Needham logic / Interpretation / First-order logic / Constructible universe / Ground expression / Logic / Mathematics / Model theory

Analysis of authentication protocols Intership report St´ephane Glondu ENS de Cachan∗ September 3, 2006

Add to Reading List

Source URL: stephane.glondu.net

Language: English - Date: 2006-09-03 17:53:44
376Security / Internet protocols / Cryptographic protocols / Kerberos / Password authentication protocol / Mutual authentication / Integrated Windows Authentication / Authentication server / Security token / Computer network security / Computer security / Computing

LNCS[removed]Peer-to-Peer Authentication with a Distributed Single Sign-On Service

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-12 23:49:30
377Lightweight Directory Access Protocol / Network security / Authentication / Computing / Internet / Blue Coat Systems / Internet protocols / Security

Blue Coat Training and Education BLUE COAT CERTIFIED PROXYSG ADMINISTRATOR Course Objective The Blue Coat Certified ProxySG Administrator (BCCPA) course is intended for IT professionals who wish to master the fundamenta

Add to Reading List

Source URL: www.dartalis.lu

Language: English - Date: 2013-01-16 06:34:37
378Cryptographic protocols / Internet / Internet protocols / Cryptographic software / Message authentication codes / SSL acceleration / Transport Layer Security / Cipher suite / Advanced Encryption Standard / Computing / Cryptography / Secure communication

Accelerating SSL with GPUs Keon Jang* Sangjin Han* Seungyeop Han†

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2010-06-21 10:43:37
379Internet protocols / Internet standards / Wvdial / Logical Link Control / Point-to-Point Protocol daemon / Modems / Point-to-point protocol / Password authentication protocol / Kppp / Software / Computing / System software

Diald Howto Diald Howto Table of Contents Diald Howto.........................................................................................................................................................1

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-12-14 11:52:47
380Computer security / Computing / Email / Computer-mediated communication / Yahoo! / DomainKeys Identified Mail / Vouch by Reference / Authentication / Email authentication / Spam filtering / Cryptographic protocols

Pilot project proposal: AffiL Affiliated domain names for email trust http://mipassoc.org/affil

Add to Reading List

Source URL: mipassoc.org

Language: English - Date: 2009-04-28 10:27:57
UPDATE