Digest access authentication

Results: 61



#Item
51Videotelephony / Universal Mobile Telecommunications System / Cryptographic protocols / Multimedia / IP Multimedia Subsystem / Session Initiation Protocol / 3GPP / AKA / Digest access authentication / Technology / Electronic engineering / Mobile technology

TS[removed]V11[removed]Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-07-10 10:32:50
52Data / Internet protocols / Directory services / HTTP / Directory Services Markup Language / Lightweight Directory Access Protocol / LDAP Data Interchange Format / Digest access authentication / SOAP / Computing / Internet standards / Internet

Directory Services Markup Language v2.0 November 29, 2001 Copyright (C) The Organization for the Advancement of Structured Information Standards [OASIS[removed]All Rights Reserved. Introduction

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2001-11-30 14:17:22
53HTTP / Microsoft Windows / Integrated Windows Authentication / Internet Explorer / Digest access authentication / Basic access authentication / NTLM / Windows Live ID / Password / Computing / Computer network security / Computer security

293_CYA_IIS6_05.qxd[removed]:20 AM

Add to Reading List

Source URL: www.adopenstatic.com

Language: English - Date: 2008-02-03 06:25:57
54Electronic commerce / Key management / Trusted timestamping / Digest access authentication / Transport Layer Security / MD5 / X.509 / Cryptographic nonce / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

CMSC 681 Project Report Implementation of TSP Protocol ---CMSC 681 Project Report Youyong Zou

Add to Reading List

Source URL: www.csee.umbc.edu

Language: English - Date: 2000-12-14 22:35:14
55Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP)

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
56Cryptographic protocols / System software / Digest access authentication / Request for Comments / Password / Basic access authentication / Pluggable authentication module / HTTP Secure / HTTP / Computing / Software

OpenWBEM Getting Started Guide Author: Dan Nuffer Last update: [removed]

Add to Reading List

Source URL: openwbem.sourceforge.net

Language: English - Date: 2004-12-09 17:23:35
57Cryptographic protocols / Data / Internet protocols / CRAM-MD5 / Digest access authentication / Simple Authentication and Security Layer / Lightweight Directory Access Protocol / Transport Layer Security / Password / Computing / Internet standards / Internet

SCRAM in LDAP Better Password-based Authentication Kurt Zeilenga

Add to Reading List

Source URL: people.apache.org

Language: English - Date: 2011-10-12 12:20:00
58Internet / Data / Secure communication / Internet standards / Internet protocols / Digest access authentication / Transport Layer Security / Basic access authentication / HTTP Secure / HTTP / Cryptographic protocols / Computing

HTTP Digest Integrity Another look, in light of recent attacks

Add to Reading List

Source URL: www.vsecurity.com

Language: English - Date: 2013-08-14 23:43:46
59Cryptographic protocols / HTTP / Password / Challenge-response authentication / Two-factor authentication / Security token / Digest access authentication / Cryptographic nonce / Authentication / Security / Cryptography / Computer security

CHAPTER 3

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:54
60Security / Password / Challenge-response authentication / Digest access authentication / Secure Remote Password protocol / Man-in-the-middle attack / Zero-knowledge proof / OTPW / Security token / Cryptography / Cryptographic protocols / Computer security

PDF Document

Add to Reading List

Source URL: drmlab.org

Language: English - Date: 2008-12-04 05:05:52
UPDATE