Authentication protocols

Results: 771



#Item
381Technology / Wireless / Cryptographic protocols / IEEE 802.11 / Wi-Fi / Extensible Authentication Protocol / IEEE 802.1X / Xsupplicant / Wireless security / Wireless networking / Computing / Computer network security

802.1X Port−Based Authentication HOWTO Lars Strand 2004−08−18 Revision History

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-12-14 11:52:39
382Deniable encryption / Deniable authentication / ID-based encryption / Digital signature / Commitment scheme / Zero-knowledge proof / RSA / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic protocols

Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot 76100, Israel [removed]

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2002-06-03 03:07:12
383Computer network security / Directory services / Internet protocols / Internet standards / Netfilter / Iptables / Lightweight Directory Access Protocol / Wireless security / Network address translation / System software / Computing / Software

Authentication Gateway HOWTO Nathan Zorn Revision History

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-12-14 11:52:40
384Alice and Bob / AutoNumber / Authentication / Cryptographic protocols / Cryptography / Security

Drawing UML with PlantUML Language Reference Guide (Version[removed]PlantUML is an Open Source project that allows to quickly write:

Add to Reading List

Source URL: plantuml.sourceforge.net

Language: English - Date: 2015-02-18 16:04:11
385Cryptographic protocols / Yahoo! / Computing / Spamming / Computer-mediated communication / DomainKeys Identified Mail / DomainKeys / Sendmail / Phishing / Email authentication / Spam filtering / Email

FAQ DomainKeys Identified Mail (DKIM) Frequently Asked Questions WHAT IS DOMAINKEYS IDENTIFIED MAIL?

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2007-11-06 18:48:17
386Public-key cryptography / Message authentication code / Key-agreement protocol / Key / Public key infrastructure / AKA / Symmetric-key algorithm / Cryptographic key types / Internet security / Cryptography / Cryptographic protocols / Key management

Microsoft Word - D200 2-Updated22Jan2010.doc

Add to Reading List

Source URL: www.foi.se

Language: English - Date: 2012-06-18 09:13:05
387Internet protocols / Two-factor authentication / Security token / One-time password / Single sign-on / Multi-factor authentication / Password / Authentication / Identity management / Security / Computer security / Access control

A UBM TECHWEB WHITE PAPER AUGUST 2012 Software-Based Authentication Delivers More Reliable and Less Costly Security With the adoption of mobility and cloud computing, coupled

Add to Reading List

Source URL: www.syferlock.com

Language: English - Date: 2013-01-16 18:01:47
388Computer network security / IEEE 802.11 / Computing / Technology / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / Temporal Key Integrity Protocol / Wired Equivalent Privacy / Cryptography / Wireless networking / Cryptographic protocols

Wireless Security’s Future Bruce Potter Cigital, Inc[removed]Ridgetop Circle Suite 400

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
389World Wide Web / Cryptographic protocols / Internet protocols / Web services / Digest access authentication / Basic access authentication / Web Application Description Language / Cryptographic nonce / Representational state transfer / Computing / HTTP / Internet

REUTERS/TIM WIMBORNE SCHOLARONE MANUSCRIPTS WEB SERVICES API REFERENCE GUIDE

Add to Reading List

Source URL: mchelp.manuscriptcentral.com

Language: English - Date: 2014-02-06 11:01:08
390Videotelephony / Universal Mobile Telecommunications System / Cryptographic protocols / IP Multimedia Subsystem / Multimedia / Session Initiation Protocol / 3GPP / AKA / Digest access authentication / Technology / Electronic engineering / Mobile technology

TS[removed]V12[removed]Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and S

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-02-05 10:14:26
UPDATE