Kerberos

Results: 405



#Item
111Internet privacy / Kerberos / Computer network / Key distribution / Node / Public-key cryptography / Tor / Wireless security / End Node Problem / Cryptography / Computing / Computer network security

Journal: Computer Networks Title:

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2002-08-27 17:57:38
112Needham–Schroeder protocol / Ciphertext indistinguishability / Kerberos / Advantage / XTR / Ticket Granting Ticket / Cryptography / Cryptographic protocols / Computer network security

Inductive Proofs of Computational Secrecy ? Arnab Roy1 , Anupam Datta2 , Ante Derek1 , John C. Mitchell1 1

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:17:14
113Kerberos / Needham–Schroeder protocol / Cryptographic nonce / Public-key cryptography / IP / Cryptographic protocols / Cryptography / Computer network security

Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:22:30
114Integrated Digital Enhanced Network / Motorola / Seman

The  Venn  of   Iden+ty  Doom     Josh  Howle5,  JANET(UK)   Internet  Iden+ty  needs  Technology  

Add to Reading List

Source URL: www.kerberos.org

Language: English - Date: 2011-10-27 14:06:12
115Computer network security / Kerberos / Computing / Software patent / Free software / X Window System / Copyright / Software / Massachusetts Institute of Technology / Data

MASSACHUSETTS INSTITUTE OF TECHNOLOGY THE MIT KERBEROS CONSORTIUM Consortium Agreement (the “Agreement”) by and between the Massachusetts Institute of Technology, having a principal place of business at 77 Massachuse

Add to Reading List

Source URL: www.kerberos.org

Language: English - Date: 2007-11-27 12:57:59
116Software / Computer network security / Key management / Internet standards / Kerberos / OpenLDAP / FreeIPA / Lightweight Directory Access Protocol / Passwd / Directory services / Computer security / Computing

FreeIPA - Control your identity LinuxAlt 2012 Martin Koˇsek, <> Sr. Software Engineer, Red Hat Nov 3rd , 2012

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-05-13 02:17:24
117Computer network security / Key management / Cloud infrastructure / Apache Hadoop / Cloud computing / Single sign-on / Kerberos / Generic Security Services Application Program Interface / Access token / Computing / Computer security / Cryptography

Hadoop Security Design Owen O’Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell Yahoo! {owen,kan,sradia,rmarti,cnh}@yahoo-inc.com October 2009

Add to Reading List

Source URL: issues.apache.org

Language: English
118Computer security / Lightweight Directory Access Protocol / Kerberos / Internet / Directory services / Computer network security / Computing

AD Integration options for Linux Systems Overview Dmitri Pal Developer Conference. Brno. 2013

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-10-17 03:55:39
119Cloud infrastructure / Hadoop / Apache Hadoop / MapReduce / Representational state transfer / Apache HTTP Server / Kerberos / Log4j / Hypertext Transfer Protocol / Computing / Software / Cloud computing

HCatalog REST API Table of contents 1 Introduction ....................................................................................................................... 2 2 URL format ..................................

Add to Reading List

Source URL: hive.apache.org

Language: English - Date: 2014-01-14 13:47:37
120Computer architecture / RADIUS / Kerberos / Windows / Active Directory / Virtual private network / Security and safety features new to Windows Vista / Features new to Windows XP / Computing / Computer network security / Microsoft Windows

JW Secure and Blue Ridge Networks Case Study Bottom Line: Results The joint collaboration of Blue Ridge Networks and JW Secure on BorderGuard Active Directory

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:20:07
UPDATE