Authentication protocols

Results: 771



#Item
551Shared secret / Public-key cryptography / Key-agreement protocol / Transport Layer Security / Provisioning / Authentication / Cryptography / Cryptographic protocols / XKMS

http://www.openauthentication.org/drafts/draft-hallambaker-oa...

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:07
552Message authentication codes / Cryptographic hash functions / Internet protocols / HMAC / HOTP / SHA-1 / Collision attack / Hash function / Wang Xiaoyun / Cryptography / Error detection and correction / Hashing

SHA-1 & HMAC OTP Frequently Asked Questions Recently, there has been considerable coverage in the press about an upcoming paper from Academics in China that describes an attack on SHA-1. OATH is providing this overview a

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:27:57
553Computing / System software / Internet protocols / Intelligent Platform Management Interface / Password / RADIUS / Two-factor authentication / HP Integrated Lights-Out / Verax IPMI java library / System administration / Information technology management / Out-of-band management

dan farmer/ [removed]/June-23rd-2014/v[removed]Sold Down the River Summary A world-wide scan of the Intelligent Platform Management Interface (IPMI) protocol identified over 230,000 Baseboard Management Controllers (

Add to Reading List

Source URL: fish2.com

Language: English - Date: 2014-06-23 10:34:54
554Cryptographic protocols / Technology / Data / Wi-Fi / IEEE 802.1X / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / IEEE 802.11r-2008 / Computing / Computer network security / Wireless networking

Deploying iPhone and iPad Wi-Fi Out of the box, iPhone and iPad can securely connect to corporate or guest Wi-Fi networks, making it quick and simple to join available wireless networks whether you’re on campus or on

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2013-09-30 04:30:55
555Internet protocols / Security token / Two-factor authentication / Multi-factor authentication / Authentication / Password authentication protocol / Strong authentication / Initiative For Open Authentication / Anakam / Security / Cryptography / Computer security

OATH FAQ February 20, 2004 OATH FAQ 1. What is OATH?

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:28:37
556Software / HOTP / Computing / Games / World of Warcraft / Google Authenticator / Internet protocols / Authenticator / Two-factor authentication

Yubico Authenticator Introduction February 7, 2014 yubico cococo

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-02-11 12:29:04
557Internet protocols / Block cipher modes of operation / Botnet / Malware / RC4 / Transmission Control Protocol / Internet security / Password authentication protocol / Transport Layer Security / Cryptography / Computing / Computer network security

P ROV E X: Detecting Botnets with Encrypted Command and Control Channels Christian Rossow †‡? and Christian J. Dietrich †¶ †University of Applied Sciences Gelsenkirchen, Institute for Internet Security, Germany

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2013-04-16 08:32:23
558Internet protocols / Federated identity / HTTP / Password / Single sign-on / SQL injection / HTTP cookie / Integrated Windows Authentication / Java Authentication and Authorization Service / Computing / Computer security / Security

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael Dalton, Christos Kozyrakis, and Nickolai Zeldovich Computer Systems Laboratory CSAIL Stanford University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
559Cryptographic protocols / Computer network security / Communications protocol / Data transmission / Protocols / Authentication protocol / Support / Integrated Windows Authentication / The Protocols of the Elders of Zion / Data / Information / Computing

Verification of security protocols with loops Laboratory, institution and university LSV, ENS Cachan and LORIA, Nancy universit´es. The internship will be located at Nancy or at ENS Cachan depending on the choice of the

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2013-10-21 04:06:44
560Internet protocols / Computing / Cryptography / Internet standards / Computer network security / Transport Layer Security / Cipher suite / Phishing / Internet security / Cryptographic protocols / Secure communication / Security

eID Online Authentication Network Threat Model, Attacks and Implications Christian J. Dietrich1,2 , Christian Rossow1,3 , and Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirc

Add to Reading List

Source URL: www.cj2s.de

Language: English - Date: 2012-03-21 04:32:04
UPDATE