Authentication

Results: 7063



#Item
241Cryptography / Directory services / Computing / Computer security / Computer access control / Free software / FreeIPA / Red Hat / 389 Directory Server / Kerberos / Lightweight Directory Access Protocol / Authentication

FreeIPA www.freeipa.org Identity Management in the FOSS World Simo Sorce Principal Software Engineer

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-05-13 02:19:28
242Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2015-12-16 04:48:58
243Email / Computing / Cyberspace / Simple Mail Transfer Protocol / Open mail relay / Internet Message Access Protocol / Message transfer agent / SMTP Authentication / Webmail / Post Office Protocol / Mailbox provider / Gmail

Zomerlust Systems Design Unit D11, Clareview Business Park

Add to Reading List

Source URL: www.zsd.co.za

Language: English - Date: 2016-08-12 12:36:51
244

Table of Contents Section 1: 3Introduction Section 2: 3General Provisions Section 3: 3Identification and Authentication Section 4: 3Operational Requirements

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2008-03-28 19:54:20
    245Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    246Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

    Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

    Add to Reading List

    Source URL: security-lab.jaist.ac.jp

    Language: English - Date: 2015-11-23 04:37:54
    247Computer access control / Cryptography / Computer security / Computing / Password / Security token / Login / Session / Password manager / Self-service password reset

    Security Measures of Trading System AyersGTS’s underlying software architecture is supported by a Security Server which provides (a) user authentication by login mechanism; (b) maintains session’s validity; (c)functi

    Add to Reading List

    Source URL: www.hkfoundersc.com

    Language: English - Date: 2015-06-22 02:44:30
    248Wireless networking / Computing / Wireless / Technology / Wireless LAN / Wireless access point / Wi-Fi / Wireless network / Supplicant / IEEE 802.1X / Wired Equivalent Privacy / Extensible Authentication Protocol

    Microsoft Word - Wireless Network StandardFinal.docx

    Add to Reading List

    Source URL: eits.uga.edu

    Language: English - Date: 2015-10-21 16:49:33
    249Computer access control / Cryptography / Computer security / Prevention / Multi-factor authentication / Authentication / Financial technology / Password

    CASE STUDY Cyber-security offering strong, cost effective two factor authentication. Small businesses

    Add to Reading List

    Source URL: www.digitalcatapultcentre.org.uk

    Language: English - Date: 2016-03-09 06:12:58
    250Computing / Wireless networking / Computer security / Cryptography / Computer network security / Extensible Authentication Protocol / Internet protocols / Wi-Fi / IEEE 802.1X / Xsupplicant / Authentication protocol / RADIUS

    802.1x/EAP Authentication Guide RadiusNT/X V5.1 IEA Software, Inc. Administrative and Support Office PO BOX 1170

    Add to Reading List

    Source URL: www.iea-software.com

    Language: English - Date: 2013-02-15 13:27:42
    UPDATE