Authentication protocols

Results: 771



#Item
611Internet / Wireless networking / Data / Computer network security / Dynamic Host Configuration Protocol / Transport Layer Security / Extensible Authentication Protocol / Wireless security / Internet standards / Computing / Cryptographic protocols

3eTI Security Policy_Apr_25.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
612Internet protocols / Secure communication / Message authentication codes / Transport Layer Security / Key generation / FIPS 140-2 / FIPS 140 / Key Wrap / Public-key cryptography / Cryptography / Key management / Cryptography standards

Microsoft Word - Kodak Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-11-24 00:00:00
613Computer security / Computer network security / Cryptographic software / Wireless networking / Secure communication / Extensible Authentication Protocol / Transport Layer Security / Wireless security / Security and safety features new to Windows Vista / Computing / Cryptographic protocols / Cryptography

3eTI Client Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
614Data / Cryptographic protocols / IPsec / HMAC / FIPS 140 / Critical Security Parameter / Avaya / Point-to-point protocol / Computing / Message authentication codes / Network architecture

Avaya G350 Branch Office Media Gateway w/FIPS Non-Proprietary Security Policy Avaya Inc. Revision Date: Thursday, October 20, 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
615Security / Internet protocols / Cryptography standards / FIPS 140-2 / HMAC / FIPS 140 / Secure Shell / Authentication protocol / Password / Cryptography / Computing / Cryptographic protocols

Microsoft Word - 46e - Brocade DCX[removed]Security Policy Rev 1.2.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-02 00:00:00
616Computer security / Data / Cryptographic protocols / Cryptography standards / Wireless security / Extensible Authentication Protocol / Wi-Fi Protected Access / TACACS+ / Cisco Catalyst / Computing / Computer network security / Wireless networking

FIPS[removed]Security Policy for Cisco Catalyst 6506, 6506-E, 6509, and 6509-E Switches with Wireless Services Modules (WiSMs) July 08, 2010 Version 2 .2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-07-30 01:00:00
617FIPS 140-2 / FIPS 140 / Key-agreement protocol / Password / Critical Security Parameter / Key management / Authentication / Diffie–Hellman key exchange / Whitfield Diffie / Cryptography / Cryptographic protocols / Cryptography standards

SNAPfone Security Policy Document Version 1.8 Snapshield, Ltd.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
618Technology / Cryptographic protocols / Wireless / IEEE 802.11 / Extensible Authentication Protocol / Wireless security / Wi-Fi Protected Access / Wireless LAN controller / TACACS+ / Wireless networking / Computer network security / Computing

FIPS[removed]Security Policy for Cisco 5508 Wireless LAN Controller Feb 11, 2014 Policy Version 3.5 This document details the Security Policy for the module. This Security Policy may be freely distributed.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-11 12:50:18
619Federated identity / Internet protocols / Internet standards / EZproxy / Internet access / Library 2.0 / Online Computer Library Center / Proxy server / Lightweight Directory Access Protocol / Computing / Internet / Library science

EZproxy EZproxy for authenticated access to your library’s e-content OCLC® EZproxy® authentication and access software allows your library to deliver secure user Web access to e-content simply and effectively. Avail

Add to Reading List

Source URL: www.oclc.org

Language: English - Date: 2014-08-21 00:48:30
620Security / Cryptography standards / Internet protocols / FIPS 140-2 / HMAC / FIPS 140 / Secure Shell / Authentication protocol / Password / Cryptography / Computing / Cryptographic protocols

Microsoft Word - 50b - Brocade 7500 Security Policy V1.2.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-02 00:00:00
UPDATE