Authentication server

Results: 233



#Item
31Internet privacy / PGP / Pretty Good Privacy / Students for a Democratic Society / Internet / SDS-PAGE / Computing / Scientific Data Systems / Samsung SDS / Computer security / Cryptographic software / Email authentication

SDS E-Business Server™ Research report by Clabby Analytics October 2012 Clabby Analytics Research Report

Add to Reading List

Source URL: www.sdsusa.com

Language: English - Date: 2015-02-13 13:30:30
32

2010 Paper 7 Question 13 Security Woo & Lam proposed a protocol that would enable a client A to log on to a server B using an authentication service S. A→

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2014-06-09 10:18:35
    33Microsoft SharePoint / Portal software / Internet Server Application Programming Interface / Integrated Windows Authentication / Password / Form / Web.config / Software / Computing / System software

    Microsoft Word - FederationSharepointConfiguration.doc

    Add to Reading List

    Source URL: federation.nih.gov

    Language: English - Date: 2009-12-18 16:27:38
    34Web application frameworks / Microsoft Visual Studio / Internet Server Application Programming Interface / Integrated Windows Authentication / Global.asax / Web.config / Digest access authentication / Internet Information Services / ASP.NET AJAX / Software / Computing / ASP.NET

    Are You Protected? Design and Deploy Secure Web Apps with ASP.NET 2.0 and IISMSDN Magazine, November 2005

    Add to Reading List

    Source URL: www.tabpi.org

    Language: English - Date: 2007-08-14 08:06:00
    35Information / Computer network security / Protected Extensible Authentication Protocol / Windows Server / Extensible Authentication Protocol / IEEE 802.1X / Windows / Authentication protocol / Transport Layer Security / Computing / Wireless networking / Data

    Cisco − Cisco Secure ACS for Windows v3.2 With PEAP−MS−CHAPv2 Machine Authentication Table of Contents Cisco Secure ACS for Windows v3.2 With PEAP−MS−CHAPv2 Machine Authentication.......................1 Docum

    Add to Reading List

    Source URL: www.awesometechhome.com

    Language: English - Date: 2012-11-19 22:22:41
    36Cryptographic protocols / Internet / Data / Secure communication / Transport Layer Security / Cipher suite / Lightweight Directory Access Protocol / FTPS / Extensible Authentication Protocol / Computing / Internet standards / Internet protocols

    Advanced Client/Server Authentication in TLS Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith Computer Science Department Brigham Young University Provo, Utah, USA 84602

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2002-02-26 10:17:06
    37Fingerprints / Access control / Identity management / Fingerprint recognition / Authentication / Password / Fingerprint / Two-factor authentication / Fingerprint SDK / Security / Biometrics / Identification

    Part A. System Design, Components and Parameters Please describe the system architecture in detail. In particular, is enrollment and authentication done locally or on a server? - The enrolment and authentication is done

    Add to Reading List

    Source URL: www.logicomedia.com

    Language: English - Date: 2015-05-06 11:28:34
    38Computer security / Kerberos / Authentication server / Ticket Granting Ticket / Challenge-response authentication / Authentication / Password / CAPTCHA / Key distribution center / Computer network security / Computing / Cryptography

    Stayin’ Alive: Aliveness as an alternative to authentication Jonathan Anderson and Robert N M Watson University of Cambridge Computer Laboratory {jonathan.anderson,robert.watson}@cl.cam.ac.uk

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2012-11-30 15:52:29
    39Federated identity / Cloud applications / Single sign-on / Windows Live ID / Two-factor authentication / Cloud computing / Windows Server / Active Directory / Security token / Software / Computing / Microsoft Windows

    Stoneware Inc. webNetwork 6.0 Feature Guide Stoneware, Inc. Date: July 2010 Related Product: webNetwork

    Add to Reading List

    Source URL: www.visiria.nl

    Language: English - Date: 2012-04-15 15:11:38
    40Information / Password authentication protocol / Peer-to-peer / Cryptographic protocols / Client–server model / Password / Digital credential / Security Support Provider Interface / Internet protocols / Computing / Data

    PPAA: Peer-to-Peer Anonymous Authentication Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

    Add to Reading List

    Source URL: www.cs.dartmouth.edu

    Language: English - Date: 2008-08-27 18:53:42
    UPDATE