Digest access authentication

Results: 61



#Item
1C HA PT E R 9 Implementing Web Security Using auth-lib.pl OVERVIEW A natural extension of most applications is the capability to restrict or track access through the application. To do this, we need a system

C HA PT E R 9 Implementing Web Security Using auth-lib.pl OVERVIEW A natural extension of most applications is the capability to restrict or track access through the application. To do this, we need a system

Add to Reading List

Source URL: www.extropia.com

Language: English - Date: 2003-08-09 07:16:17
2Server-driven Outbound Web-application Sandboxing  FP7-ICT, Project Nohttps://www.websand.eu  Deliverable D1.1

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D1.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:48
3gsaslGenerated by DoxygenFri Oct:50:52  Contents

gsaslGenerated by DoxygenFri Oct:50:52 Contents

Add to Reading List

Source URL: josefsson.org

Language: English - Date: 2015-08-11 16:46:21
4Release Notes: Apache HTTP ServerApache HTTP Server Release Notes VersionSep/09

Release Notes: Apache HTTP ServerApache HTTP Server Release Notes VersionSep/09

Add to Reading List

Source URL: www.midori-global.com

Language: English - Date: 2016-06-01 09:41:38
5Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Add to Reading List

Source URL: asokan.org

Language: English - Date: 2015-04-08 16:31:41
6Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
7CHAPTER  3 Protocols It is impossible to foresee the consequences of being clever.

CHAPTER 3 Protocols It is impossible to foresee the consequences of being clever.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:54
8RETS Certification System RETSand 1.8 Testing Rules Version: 02 June 2014 RETS Compliance & Certification

RETS Certification System RETSand 1.8 Testing Rules Version: 02 June 2014 RETS Compliance & Certification

Add to Reading List

Source URL: www.reso.org

Language: English - Date: 2014-06-19 14:06:06
9Are You Protected? Design and Deploy Secure Web Apps with ASP.NET 2.0 and IISMSDN Magazine, November 2005

Are You Protected? Design and Deploy Secure Web Apps with ASP.NET 2.0 and IISMSDN Magazine, November 2005

Add to Reading List

Source URL: www.tabpi.org

Language: English - Date: 2007-08-14 08:06:00
10Brekeke PBX - Version 2.1 User Guide

Brekeke PBX - Version 2.1 User Guide

Add to Reading List

Source URL: www.brekeke.com

Language: English - Date: 2013-03-29 15:51:49