Authentication protocols

Results: 771



#Item
601Internet Explorer / Network file systems / Internet standards / Integrated Windows Authentication / NTLM / Server Message Block / Microsoft Media Server / WebDAV / Security Support Provider Interface / Computing / Computer network security / Internet protocols

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-05-08 17:52:57
602Email / Computing / Computer security / Yahoo! / DomainKeys Identified Mail / DomainKeys / S/MIME / Mail submission agent / X.509 / Email authentication / Spam filtering / Cryptographic protocols

Network Working Group Internet Draft Intended status: Informational Expires: January 2009

Add to Reading List

Source URL: dkim.org

Language: English - Date: 2008-07-12 03:01:57
603Yahoo! / Computing / DomainKeys Identified Mail / Data / Information / DomainKeys / Domain Name System / Author Domain Signing Practices / Email authentication / Spam filtering / Cryptographic protocols

DomainKeys Identified Mail (DKIM) Allows an organization to claim responsibility for transmitting a message, in a way that can be validated by a recipient

Add to Reading List

Source URL: dkim.org

Language: English - Date: 2009-07-12 13:08:00
604HTTP / Key management / WS-Security / Password / Public key certificate / Authentication / X.509 / HTTP Secure / SAP Logon Ticket / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.dgaiec.min-financas.pt

Language: English - Date: 2014-08-23 10:15:23
605Yahoo! / Computer security / Computing / Email / DomainKeys Identified Mail / DomainKeys / Author Domain Signing Practices / Domain Name System / Transmission Control Protocol / Email authentication / Spam filtering / Cryptographic protocols

DomainKeys Identified Mail (DKIM) D. Crocker Brandenburg InternetWorking [removed]

Add to Reading List

Source URL: dkim.org

Language: English - Date: 2008-03-13 09:03:35
606Domain / Email authentication / Identifiers / Internet / Computing / Domain name system / Protein domain / Protein structure

iLearnOregon STATEWIDE PROTOCOLS TITLE: Content Sharing Protocol NUMBER: 08-004

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 21:42:31
607Yahoo! / Computer security / System software / Computing / Spamming / DomainKeys Identified Mail / DomainKeys / Anti-spam techniques / SMTP / Spam filtering / Email authentication / Cryptographic protocols

DKIM (DomainKeys Identified Mail, RFC[removed]Roman Valls GuimerĂ  What is it ?

Add to Reading List

Source URL: dkim.org

Language: English - Date: 2009-06-08 07:53:43
608Key management / Public-key cryptography / Cryptographic protocols / Electronic commerce / Password / Transport Layer Security / HTTP Secure / Two-factor authentication / Phishing / Cryptography / Security / Secure communication

April 10, 2014 To: IT Executives and Security Staff CRITICAL Vulnerability In OpenSSL: HeartBleed The REN-ISAC [1] wants to stimulate immediate action concerning a CRITICAL vulnerability in a pervasive piece of software,

Add to Reading List

Source URL: www.ren-isac.net

Language: English - Date: 2014-04-10 17:07:16
6093-D Secure / Data / Information / Authentication / Chargeback / 3D / Smart card / Cryptographic protocols / Merchant services / Security

September 26, 2011 Private and Confidential Agenda •

Add to Reading List

Source URL: www.chicagofed.org

Language: English - Date: 2011-10-03 15:06:04
UPDATE