Authentication server

Results: 233



#Item
131Public key infrastructure / Public key certificate / Certificate authority / Phishing / Digital signature / Password / Authentication / Certificate policy / Certificate server / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - Application of PKI in IT Security v4.1.ppt [相容模式]

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2012-10-26 00:43:01
132Internet privacy / Computer network security / Password / Cross-site scripting / Phishing / Two-factor authentication / Proxy server / One-time password / Application firewall / Security / Computer security / Computing

InfoSec – FAQs Web Application Security 1.

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2009-06-15 09:06:09
133VMware ESX / VMware / Software / System software

Technical Note CIM Authentication for Lockdown Mode VMware CIM SMASH/Server Management API CIM Ticket Authentication

Add to Reading List

Source URL: www.vmware.com

Language: English - Date: 2010-04-06 20:22:25
134PGP / Key management / Email authentication / Key server / Web of trust / Usability / Email encryption / Secure communication / Pretty Good Privacy / Cryptography / Internet privacy / Public-key cryptography

Microsoft Word - usenix final.doc

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:51:36
135Java platform / Directory services / Federated identity / OpenSSO / Internet protocols / Oracle Corporation / Authentication / Security token / Lightweight Directory Access Protocol / Computing / Software / Java enterprise platform

Oracle OpenSSO Security Token Server Administration Guide

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2010-08-13 18:28:40
136Security / Internet protocols / Cryptographic protocols / Kerberos / Password authentication protocol / Mutual authentication / Integrated Windows Authentication / Authentication server / Security token / Computer network security / Computer security / Computing

LNCS[removed]Peer-to-Peer Authentication with a Distributed Single Sign-On Service

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-12 23:49:30
137Cryptography / Kerberos / Key distribution center / Ticket Granting Ticket / Generic Security Services Application Program Interface / Integrated Windows Authentication / Authentication server / Ticket / STARTTLS / Computer network security / Computing / Computer security

Shishi Kerberos 5 implementation for the GNU system for version 1.0.2, 3 April 2013 Simon Josefsson

Add to Reading List

Source URL: www.gnu.org

Language: English - Date: 2013-04-03 06:58:02
138Security / Security token / Integrated Windows Authentication / Kerberos / Authentication server / Password authentication protocol / Single sign-on / Digest access authentication / Extensible Authentication Protocol / Computer security / Computer network security / Computing

Peer-to-Peer Authentication with a Distributed Single Sign-On Service ∗ William Josephson Emin G¨un Sirer

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 22:58:13
139Cryptography / Kerberos / Ticket Granting Ticket / Single sign-on / Key distribution center / Integrated Windows Authentication / NTLM / Ticket / Authentication server / Computer network security / Computer security / Computing

Microsoft Word - white_paper_draft_2.doc

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
140Postal Index Number / Telephone numbers in the United Kingdom / Communication

ActivCard The ActivCard is employed for the strong authentication of the user. Every minute, a new individual number for your ActivCard is generated via a mathematical algorithm which is synchronised with our server. In

Add to Reading List

Source URL: www.jsafrasarasin.ch

Language: English - Date: 2013-06-09 11:07:54
UPDATE