Authentication protocols

Results: 771



#Item
1A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012  Stig F. Mjølsnes

A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012 Stig F. Mjølsnes

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:12
    2SMAPs: Short Message Authentication Protocols Khaled Baqer1 , Johann Bezuidenhoudt2 , Ross Anderson1 , and Markus Kuhn1 1  Computer Laboratory, University of Cambridge, Cambridge, UK

    SMAPs: Short Message Authentication Protocols Khaled Baqer1 , Johann Bezuidenhoudt2 , Ross Anderson1 , and Markus Kuhn1 1 Computer Laboratory, University of Cambridge, Cambridge, UK

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2017-08-27 10:50:50
      3

      PDF Document

      Add to Reading List

      Source URL: www.inforouter.com

      Language: English - Date: 2015-03-26 12:13:27
      4Definition of Systempay Standard Web Services Version 2.6a Writing, Reviewing, Approval

      Definition of Systempay Standard Web Services Version 2.6a Writing, Reviewing, Approval

      Add to Reading List

      Source URL: systempay.cyberpluspaiement.com

      Language: English - Date: 2012-10-17 09:29:30
      5Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

      Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

      Add to Reading List

      Source URL: ietf.org

      Language: English - Date: 2014-03-02 06:27:58
      6C HA PT E R 9 Implementing Web Security Using auth-lib.pl OVERVIEW A natural extension of most applications is the capability to restrict or track access through the application. To do this, we need a system

      C HA PT E R 9 Implementing Web Security Using auth-lib.pl OVERVIEW A natural extension of most applications is the capability to restrict or track access through the application. To do this, we need a system

      Add to Reading List

      Source URL: www.extropia.com

      Language: English - Date: 2003-08-09 07:16:17
      7Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

      Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

      Add to Reading List

      Source URL: systempay.cyberpluspaiement.com

      Language: English - Date: 2015-12-16 04:48:58
      8Microsoft Word - Web-Config-Settings.docx

      Microsoft Word - Web-Config-Settings.docx

      Add to Reading List

      Source URL: www.inforouter.com

      Language: English - Date: 2016-04-21 07:34:12
      9RadiusNT & RadiusX Dial-Up, VPN, Wireless & VOIP For Windows, Linux, FreeBSD and Solaris Version 5.1

      RadiusNT & RadiusX Dial-Up, VPN, Wireless & VOIP For Windows, Linux, FreeBSD and Solaris Version 5.1

      Add to Reading List

      Source URL: www.iea-software.com

      Language: English - Date: 2013-02-14 00:20:40
      10Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

      Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

      Add to Reading List

      Source URL: paiement.systempay.fr

      Language: English - Date: 2015-12-16 04:48:58