Authentication protocols

Results: 771



#Item
511Identity management / Access control / Cryptographic protocols / Computer security / Assertion / XML / XKMS / Authentication / Security Assertion Markup Language / Computing / Security / Cryptography standards

PDF Document

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2001-12-10 20:12:22
512Cyberwarfare / Tunneling protocols / Virtual private networks / Internet privacy / Network architecture / OpenVPN / RADIUS / ESET / Two-factor authentication / Computing / Computer network security / Computer security

ESETNA-5847-VPN Flyer for RSA-HIMSS-v2[removed]indd

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2014-02-11 15:29:48
513Electronic documents / Cryptographic protocols / Electronic commerce / Key management / Password / Public key certificate / Identity management / Authentication / X.509 / Cryptography / Security / Public-key cryptography

CROMERR System Checklist Item Attachment 1 – SCS Registration Maintenance Rules of Behavior Release.doc Attachment 2 – SCS Sample Electronic Signature Agreement.docx Attachment 3 – Process flow for e-signature and

Add to Reading List

Source URL: www.exchangenetwork.net

Language: English - Date: 2014-03-10 02:45:05
514Security / Computing / Information / Metadata / Open Archives Initiative Protocol for Metadata Harvesting / Open access / Access token / Authentication / User / Archival science / Digital libraries / Internet protocols

Requester Information Name: E-Mail: Position:

Add to Reading List

Source URL: ands.org.au

Language: English - Date: 2011-09-25 21:47:49
515Dolev-Yao model / Secure multi-party computation / Cryptographic primitive / Formal verification / Communications protocol / Transport Layer Security / Authentication protocol / Secure channel / Random oracle / Cryptography / Cryptographic protocols / Universal composability

Report on DIMACS∗ Workshop on Security Analysis of Protocols Date of workshop: June 7 – 9, 2004 Workshop Organizers: John Mitchell, Stanford University Ran Canetti, IBM Watson

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-27 15:21:45
516Business / Identity management / Access control / Cryptographic protocols / Merchant account / Credit card / Credential / PayPal / Authentication / Payment systems / Electronic commerce / Security

Offline Micropayments without Trusted Hardware Matt Blaze AT&T Labs – Research [removed] John Ioannidis AT&T Labs – Research

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2001-03-05 21:20:36
517Computer security / Internet standards / Code division multiple access / Computer network security / Cryptographic protocols / AAA protocol / RADIUS / OAuth / Kerberos / Computing / Internet protocols / Internet

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2014-03-02 06:27:58
518Computer network security / Technology / Cryptographic protocols / Internet protocols / Extensible Authentication Protocol / IEEE 802.1X / IEEE 802.11 / Wireless LAN / RADIUS / Wireless networking / Cryptography / Computing

A Solution for Wireless Privacy and Payments based on E-cash A. Karygiannis∗ Aggelos Kiayias1† Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
519Identity management / Internet standards / Access control / Internet protocols / Security Assertion Markup Language / SAML 1.1 / PERMIS / RADIUS / Authentication / Computing / Computer security / Security

1 2 OASIS Security Services TC Glossary

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2001-06-25 10:32:16
520Cryptographic protocols / Computer security / Computing / Yahoo! / Spamming / DomainKeys Identified Mail / DomainKeys / Proofpoint /  Inc. / Sendmail / Spam filtering / Email authentication / Email

Tile Goes Here DomainKeys Identified Mail (DKIM) Frequently Asked Questions What is DomainKeys Identified Mail?

Add to Reading List

Source URL: www.proofpoint.com

Language: English - Date: 2014-03-24 16:34:49
UPDATE