Authentication protocols

Results: 771



#Item
681Cryptographic protocols / Universal Serial Bus / Password / HTTP Secure / Smart card / Authentication / Two-factor authentication / Password manager / Security / Cryptography / Security token

1.For Moser Baer USB Token (You may download driver from https://nicca.nic.in Support->Download Driver Sr. No. 11) Windows 7 Professional SP1. Windows Vista Professional SP2. or

Add to Reading List

Source URL: www.sheopur.nic.in

Language: English - Date: 2012-08-16 01:16:30
682Computer security / Computer network security / Internet / Generic Security Services Application Program Interface / Simple Authentication and Security Layer / SPNEGO / Security Support Provider Interface / Kerberos / Secure Shell / Computing / Internet standards / Cryptographic protocols

GSS-Proxy: Better privilege separation Simo Sorce Principal Software Engineer, Red Hat February 2013

Add to Reading List

Source URL: ssimo.org

Language: English - Date: 2013-05-30 12:12:39
683Kerberized Internet Negotiation of Keys / Advanced Encryption Standard / AKA / Authentication / Kerberos / Cryptography / Cryptographic protocols / Computer network security

TAHI Project Conformance Test Specification KINK Technical Document Revision 1.0.0

Add to Reading List

Source URL: www.tahi.org

Language: English - Date: 2010-03-23 04:47:06
684Software / Computer network security / Cryptographic protocols / Kerberos / Generic Security Services Application Program Interface / Directory services / Pluggable authentication module / Single sign-on / Simple Authentication and Security Layer / Computing / Computer security / Internet standards

Kerberos The Network Authentication Protocol Presented by: Derek Konigsberg [removed]

Add to Reading List

Source URL: www.logicprobe.org

Language: English - Date: 2005-12-15 13:03:23
685Internet / Internet protocols / Network architecture / Internet standards / HTTP / Transport Layer Security / HTTP Secure / Cipher suite / TLS-SRP / Cryptographic protocols / Computing / Secure communication

1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

Add to Reading List

Source URL: www.secure-resumption.com

Language: English - Date: 2014-02-27 10:40:02
686Electronic commerce / Key management / Trusted timestamping / Digest access authentication / Transport Layer Security / MD5 / X.509 / Cryptographic nonce / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

CMSC 681 Project Report Implementation of TSP Protocol ---CMSC 681 Project Report Youyong Zou

Add to Reading List

Source URL: www.csee.umbc.edu

Language: English - Date: 2000-12-14 22:35:14
687Key management / Cyberwarfare / Kerberos / Ticket Granting Ticket / Cryptographic protocols / Single sign-on / Key distribution center / Internet protocols / Generic Security Service Algorithm for Secret Key Transaction / Computer network security / Cryptography / Computer security

Single Sign On with Kerberos (Get a Ticket Granting Ticket then Use it to Obtain a Service Ticket) User Client Kerberos Key Distribution Center Authentication

Add to Reading List

Source URL: www.eventhelix.com

Language: English - Date: 2014-05-21 23:18:03
688Yahoo! / Computer security / System software / Computing / Spamming / DomainKeys Identified Mail / DomainKeys / Anti-spam techniques / SMTP / Spam filtering / Email authentication / Cryptographic protocols

DKIM (DomainKeys Identified Mail, RFC[removed]Roman Valls Guimerà What is it ?

Add to Reading List

Source URL: www.dkim.org

Language: English - Date: 2009-06-08 07:53:43
689Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:55
690Cryptographic protocols / Key management / HMAC / Key derivation function / Cryptographic hash function / Transport Layer Security / Key / CMAC / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP[removed]Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:44:46
UPDATE