Authentication protocols

Results: 771



#Item
391Computing / Computer-mediated communication / Spamming / Cryptographic protocols / DomainKeys Identified Mail / DomainKeys / MDaemon / Domain Assurance Council / Phishing / Email authentication / Spam filtering / Email

DKIM Interop Testing Event – For Immediate Release Internet Messaging Leaders Work Together to Fight Email Fraud Email Testing Event Strengthens Sender Accountability DALLAS, Texas and SUNNYVALE, California – Novemb

Add to Reading List

Source URL: dkim.org

Language: English - Date: 2008-07-25 21:50:27
392Security / OAuth / HTTP / Identity management / Access token / Authorization / Basic access authentication / SAML 2.0 / Security Assertion Markup Language / Computing / Computer security / Internet protocols

draft-ietf-oauth-v2-12 - The OAuth 2.0 Authorization Framework

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-01-11 14:21:43
393Authentication / Notary / Packaging / OWASP / Cryptographic protocols / Security / Computer security / Access control

SECURING MOBILE APPLICATIONS Ulf Larson Göteborg [removed] Thursday, September 13, 12

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-09-13 15:14:23
394Password / One-time password / Cryptographic software / Two-factor authentication / PBKDF2 / Salt / Transaction authentication number / Computer network security / Cryptographic protocols / Security / Computer security / Access control

Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: •

Add to Reading List

Source URL: www.dashlane.com

Language: English - Date: 2014-12-08 17:29:08
395Technology / Wireless networking / Computer network security / Electronic engineering / Internet Protocol / Extensible Authentication Protocol / EAP-SIM / Wi-Fi Alliance / IEEE 802.11u / Wi-Fi / Cryptographic protocols / Computing

White Paper Architecture for Mobile Data Offload over Wi-Fi Access Networks Introduction Mobile network traffic is growing exponentially, and service providers must manage their networks efficiently to

Add to Reading List

Source URL: www.cisco.com

Language: English
396Federated identity / Internet standards / Internet protocols / Authorization / Authentication / Identity management / Two-factor authentication / Security token / Lightweight Directory Access Protocol / Security / Computer security / Computing

Microsoft Word - IdentityManagementReference ArchitectureForDesign.doc

Add to Reading List

Source URL: designfest.acm.org

Language: English - Date: 2007-01-15 17:50:22
397Network architecture / Internet standards / Internet protocols / Secure communication / HTTP / TLS-SRP / HTTP Secure / Post Office Protocol / File Transfer Protocol / Cryptographic protocols / Internet / Computing

HTTP Mutual authentication protocol proposal

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2009-03-25 21:32:52
398Internet standards / Data / Computer network security / Routers / TACACS+ / Cisco IOS / TACACS / RADIUS / IOS XR / Computing / Network architecture / Internet protocols

Authentication, Authorization, and Accounting Commands This module describes the commands used to configure authentication, authorization, and accounting (AAA) services. For detailed information about AAA concepts, confi

Add to Reading List

Source URL: www.cisco.com

Language: English
399OSI protocols / Simple Mail Transfer Protocol / Extended SMTP / Bounce address / MIME / Anti-spam techniques / SMTP Authentication / Email / Computer-mediated communication / Computing

Application Inspection and Control for SMTP The Application Inspection for SMTP feature provides an intense provisioning mechanism that can be configured to inspect packets on a granular level so that malicious network a

Add to Reading List

Source URL: www.cisco.com

Language: English
400Internet protocols / Network management / Internet standards / Computer network security / RADIUS / IEEE 802.1X / Extensible Authentication Protocol / Management information base / IP multicast / Computing / Network architecture / Internet

Data sheet HP 830 Unified Wired-WLAN Switch Series Key features • Unified wired and wireless services for branch offices

Add to Reading List

Source URL: h17007.www1.hp.com

Language: English - Date: 2013-05-09 08:56:48
UPDATE