Kerberos

Results: 405



#Item
101Computer network security / Directory services / Active Directory / Windows / Kerberos / Privilege / Authentication / Unix / Authorization / System software / Software / Computer security

PDF Document

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:21:27
102Computing / NTLM / Single sign-on / Active Directory / Integrated Windows Authentication / Kerberos / Windows Server / SAP Logon Ticket / Security and safety features new to Windows Vista / Microsoft Windows / Computer network security / Computer security

PDF Document

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2013-01-21 17:01:54
103Internet standards / Internet / Lightweight Directory Access Protocol / Kerberos / Network architecture / Network File System / Directory services / Computing / Internet protocols

PDF Document

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2005-08-24 08:57:12
104Inter-process communication / Computer network security / Distributed Computing Environment / OpenVMS / Generic Security Services Application Program Interface / NTLM / Kerberos / Interface description language / DCE/RPC / Computing / Concurrent computing / Remote procedure call

HP DCE for OpenVMS Alpha and OpenVMS I64 Installation and Configuration Guide Order Number: BA361January 2005

Add to Reading List

Source URL: www.openvms.compaq.com

Language: English - Date: 2008-03-10 11:54:15
105Computing / Integrated Windows Authentication / Kerberos / SPNEGO / NTLM / Active Directory / Access token / Password / Authentication / Microsoft Windows / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2011-09-13 15:51:45
106Massachusetts Institute of Technology / Project Athena / Directory services / Kerberos / Hesiod / Solaris / Zephyr / Workstation / X Window System / Software / Computing / Domain name system

The following paper was originally published in the Proceedings of the Twelfth Systems Administration Conference (LISA ’98) Boston, Massachusetts, December 6-11, 1998 Anatomy of an Athena Workstation

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 1998-12-11 19:19:50
107Computer security / Copyright law / Computer network security / Security token / Digital rights management / Authentication / Microcontroller / Embedded system / Kerberos / Cryptography / Security / Packaging

Secure Your Embedded Devices using AT90SC/SO and VaultIC Secure Your Embedded Devices using AT90SC/SO and VaultIC

Add to Reading List

Source URL: www.insidesecure.com

Language: English
108Computer network security / Wireless networking / Two-factor authentication / Kerberos / Password / Authentication / Wireless sensor network / Security / Cryptography / Computer security

1 Improvement of Das’s Two-Factor Authentication Protocol in Wireless Sensor Networks DaeHun Nyang and Mun-Kyu Lee

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-21 03:25:04
109Cryptography / Kerberos / Ticket Granting Ticket / Single sign-on / Key distribution center / Integrated Windows Authentication / NTLM / Ticket / Authentication server / Computer network security / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:33
110Computing / Kerberos / Password / Authentication / Security and safety features new to Windows Vista / SAP Logon Ticket / Computer network security / Computer security / Security

JW Secure and Microsoft’s Read-Only Domain Controller: Kerberos Filter Case Study Bottom Line: Results JW Secure worked closely with Microsoft® IT to implement an extension to their readonly domain controller (RODC) t

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:20:05
UPDATE