Authentication protocols

Results: 771



#Item
471Password / Authentication / Computer network security / Internet protocols / Security / Cryptography / Access control

Microsoft Word - Institutional LAPOP License for AmericasBarometer data sets subscription RENEWAL v5[removed]

Add to Reading List

Source URL: www.vanderbilt.edu

Language: English - Date: 2012-07-25 13:18:01
472ComPsych / Cigna / Employee benefit / Computer network security / Extensible Authentication Protocol / Computing / Cryptographic protocols / Employment compensation / Occupational safety and health / Employee assistance program

Frequently Asked Questions Employee Assistance (EAP) and Work/Life Support Program with Cigna Behavioral Health Effective September 1, [removed]Phone number: [removed]Website: www.cignabehavioral.com employer

Add to Reading List

Source URL: www.bcps.org

Language: English - Date: 2013-08-22 17:25:44
473Cryptographic protocols / HTTP / Internet standards / Email / Internet protocols / Digest access authentication / MD5 / MIME / Cryptographic hash function / Computing / Internet / Data

Network Working Group Request for Comments: 3230 Category: Standards Track J. Mogul Compaq WRL

Add to Reading List

Source URL: rfc.askapache.com

Language: English
474Data / Internet protocols / Cryptographic protocols / Computer network security / Extensible Authentication Protocol / IEEE 802.11r-2008 / RADIUS / Password authentication protocol / Authentication / Wireless networking / Computing / Technology

Using the EAP Framework for Fast Media Independent Handover Authentication∗ Antonio Izquierdo [removed] Katrin Hoeper [removed]

Add to Reading List

Source URL: w3.antd.nist.gov

Language: English - Date: 2009-02-17 16:52:39
475Cryptographic protocols / Internet protocols / Internet standards / Secure communication / Bluetooth / Security token / Transport Layer Security / Beacon / Authentication / Technology / Computing / Security

Proximity-based Authentication for Mobile Devices Wayne Jansen Serban Gavrila Vlad Korolev

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
476Yahoo! / Computing / Email / Computer-mediated communication / DomainKeys Identified Mail / Spamming / DomainKeys / Anti-spam techniques / Domain Name System / Spam filtering / Email authentication / Cryptographic protocols

DKIM CoverGettingStarted2

Add to Reading List

Source URL: docs.ipswitch.com

Language: English - Date: 2010-11-24 11:47:08
477IEEE 802.1X / Data / Information / Extensible Authentication Protocol / Internet protocols / IEEE 802.11 / RADIUS / Supplicant / Authenticator / Computing / Computer network security / Wireless networking

                

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2002-12-12 22:20:05
478Cryptographic protocols / Computer network security / Internet protocols / Internet standards / Secure communication / Bluetooth / Security token / Transport Layer Security / Authentication / Computing / Security / Technology

A Location-Based Mechanism for Mobile Device Security Wayne Jansen The National Institute of Standards and Technology Abstract While mobile handheld devices, such as cell phones

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-07-01 01:00:00
479Internet protocols / Security token / One-time password / Two-factor authentication / Password / ESET / RADIUS / Password manager / ESET NOD32 / Computer security / Security / Access control

Solutions Overview Proven. Trusted. ESET Secure Authentication ESET Secure Authentication protects passwords and prevents data breaches

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2013-02-21 10:15:14
480Data / Cryptographic protocols / Computer network security / Internet standards / Internet protocols / Digest access authentication / Basic access authentication / Cryptographic nonce / Challenge-response authentication / Computing / Internet / HTTP

Network Working Group Request for Comments: 2617 Obsoletes: 2069 Category: Standards Track J. Franks

Add to Reading List

Source URL: rfc.askapache.com

Language: English
UPDATE