Authentication server

Results: 233



#Item
221Cyberwarfare / Kerberos / Server Message Block / NTLM / SMBRelay / Authentication protocol / Authentication server / Cain and Abel / Computer network security / Computing / Computer security

SMB Hijacking. Kerberos is defeated. © Ares, June[removed]removed]

Add to Reading List

Source URL: intercepter.nerf.ru

Language: English - Date: 2013-06-19 02:32:24
222Password / Secure Shell / Authentication / TeraGrid / Form / Computing / Grid computing / Proxy server

HotGrid: Graduated Access to Grid-based Science Gateways Roy Williams, Conrad Steenberg, and Julian Bunn California Institute of Technology, Pasadena, California, USA Submitted to the European Grid Conference, Amsterdam

Add to Reading List

Source URL: authors.library.caltech.edu

Language: English - Date: 2012-12-26 09:32:45
223Computer network security / Key management / Kerberos / Generic Security Services Application Program Interface / Single sign-on / Ticket Granting Ticket / Key distribution center / Cryptographic protocols / Generic Security Service Algorithm for Secret Key Transaction / Computer security / Computing / Cryptography

Simplify enterprise Java authentication with single sign-on Design secure client/server Java applications that use GSS-API and

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2013-09-18 06:43:11
224Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-12-02 17:00:16
225Internet Information Services / ASP.NET / Integrated Windows Authentication / RADIUS / SQL Server Reporting Services / Internet Server Application Programming Interface / Software / Computing / Windows Server

Extraxi aaa-reports! Web Reporting User Guide

Add to Reading List

Source URL: www.extraxi.com

Language: English - Date: 2009-02-27 05:15:50
226

WINDOWS LIVE MAIL Setup Outgoing (SMTP) Server Authentication

Add to Reading List

Source URL: www.futureweb.com.au

- Date: 2014-05-13 05:26:36
    227Universal Mobile Telecommunications System / Generic Authentication Architecture / Standards organizations / Bootstrapping Server Function / Generic Bootstrapping Architecture / Videotelephony / 3GPP / European Telecommunications Standards Institute / Telecoms & Internet converged Services & Protocols for Advanced Networks / Technology / Mobile technology / Electronic engineering

    ETSI TR[removed]V6[removed]Technical Report

    Add to Reading List

    Source URL: www.etsi.org

    Language: English - Date: 2005-04-14 02:35:50
    228Phishing / Internet / Computer security / Proxy server / Password strength / Password manager / Computer crimes / Computing / Password

    The Emperor’s New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies∗†

    Add to Reading List

    Source URL: www.usablesecurity.org

    Language: English - Date: 2007-02-04 18:36:52
    229Cyberwarfare / Kerberos / Authentication server / Ticket / Project Athena / Authentication / Integrated Windows Authentication / Generic Security Services Application Program Interface / Computer network security / Computing / Computer security

    PROJECT ATHENA TECHNICAL PLAN Section E.2.1

    Add to Reading List

    Source URL: web.mit.edu

    Language: English - Date: 2000-01-05 22:11:11
    230Internet protocols / Computer network security / HOTP / One-time password / Two-factor authentication / Password authentication protocol / Password / Authentication server / Authentication / Computer security / Security / Cryptography

    HOTP-Based User Authentication Scheme in Home Networks Binod Vaidya1 , Jong Hyuk Park2 , and Joel J.P.C. Rodrigues3

    Add to Reading List

    Source URL: netgna.it.ubi.pt

    Language: English - Date: 2011-03-16 07:13:06
    UPDATE