Kerberos

Results: 405



#Item
161Presentation / Photography / Slide show / Moodle / Kerberos / Software / Educational software / Learning

Online syllabus: All of the links for your students are on the online version of the Hum syllabus, which is at: _http://academic.reed.edu/humanities/hum110/syllabus_.

Add to Reading List

Source URL: cdm.reed.edu

Language: English - Date: 2010-08-20 15:05:07
162Computer network security / Secure Shell / Single sign-on / Kerberos / Authentication / Password / Two-factor authentication / Security and safety features new to Windows Vista / Security / Computer security / Cryptography

SHAD: A Human-Centered Security Architecture for the Plan B Operating System ∗ Enrique Soriano, Francisco J. Ballesteros, and Gorka Guardiola Laboratorio de Sistemas – Universidad Rey Juan Carlos Madrid, Spain. http:

Add to Reading List

Source URL: lsub.org

Language: English - Date: 2014-05-08 10:53:15
163Computer network security / Federated identity / Identity management / Kerberos / Single sign-on / Authentication / Access token / Principal / Authorization / Security / Computer security / Access control

Accountability and Control of Process Creation in Metasystems Marty Humphrey, Frederick Knabe, Adam Ferrari, and Andrew Grimshaw Department of Computer Science University of Virginia Charlottesville, VA

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2001-09-17 13:13:14
164Security / WS-Security / Security token / Internet security / SOAP / Public-key cryptography / Kerberos / Cryptography / Security service / Computing / Computer security / Computer network security

Web Services Security

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-11-26 02:19:12
165Presentation / Assistive technology / Cross-platform software / Educational technology / Moodle / CONTENTdm / Kerberos / Syllabus / Slide show / Software / Educational software / Education

Technology  in Your Hum 110  Conference or  Lecture    

Add to Reading List

Source URL: cdm.reed.edu

Language: English - Date: 2010-08-20 15:05:07
166Kerberos / Public key certificate / Cyberwarfare / Computer security / Security / Public-key cryptography / Key management / Computer network security

FreeIPA 3.3 Training Series FreeIPA Client and Server Improvements in FreeIPA 3.3 Martin Košek <>

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2014-04-14 07:11:13
167Universal composability / Authentication protocol / Password authentication protocol / Secure multi-party computation / Integrated Windows Authentication / Authentication / Password / Man-in-the-middle attack / Kerberos / Cryptography / Cryptographic protocols / Security

Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-20 14:16:00
168Password / Coeus / Login / SWF / Authenticator / Computer security / Computing / Computer network security / Kerberos

Introduction to Coeus Hand out

Add to Reading List

Source URL: www.dartmouth.edu

Language: English - Date: 2014-07-16 12:57:54
169Public-key cryptography / Kerberos / Password / Diffie–Hellman key exchange / Shared secret / Key / Cryptography / Cryptographic protocols / Key management

Microsoft Word - Design of hybrid protocol-in password-based three-party key exchange settting.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-29 06:14:31
170Computer security / Integrated Windows Authentication / SPNEGO / Internet Server Application Programming Interface / Kerberos / Active Directory / Windows / NTLM / Password / Microsoft Windows / Computer network security / Computing

SSO Plug-in v 3.2 Troubleshooting J System Solutions http://www.javasystemsolutions.com Version 3.2

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2011-05-30 04:30:53
UPDATE