Kerberos

Results: 405



#Item
301Quantum cryptography / Applied mathematics / Quantum key distribution / BB84 / Quantum entanglement / Kerberos / Quantum computer / Password / Key size / Cryptography / Theoretical computer science / Quantum information science

Authentication and Authorization Using Entangled Photons

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-26 01:00:00
302Microsoft DNS / Kerberos / Computer network security / Password / Server

Protecting the Knowledge in KBA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
303Cryptographic protocols / Cryptography standards / Internet standards / WS-Security / Generic Security Services Application Program Interface / Kerberos / SPNEGO / Web Services Security Kerberos Binding / WS-SecureConversation / Computing / Computer security / Security

Web Services Security Kerberos Binding December 2003 Authors Giovanni Della-Libera, Microsoft Brendan Dixon, Microsoft Praerit Garg, Microsoft

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2003-12-27 07:59:04
304Tickets / Computing / Password / Project Athena / Information / Data / Internet protocols / Computer network security / Kerberos

Designing an Authentication System: a Dialogue in Four Scenes Bill Bryant Project Athena Massachusetts Institute of Technology Cambridge, MA 02139

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-09-04 11:43:39
305Computer network security / Password / Key management / Kerberos / Ticket Granting Ticket / Salt / Secure Remote Password protocol / Authentication server / Password manager / Cryptography / Computer security / Cyberwarfare

A Real-World Analysis of Kerberos Password Security Thomas Wu Computer Science Department Stanford University [removed]

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-10-02 14:08:12
306System software / Simple Authentication and Security Layer / CRAM-MD5 / Generic Security Services Application Program Interface / Kerberos / Cygwin / Linux / GNU / NTLM / Computing / Software / Internet standards

GNU SASL Simple Authentication and Security Layer for the GNU system for version 1.8.0, 22 May 2012 Simon Josefsson

Add to Reading List

Source URL: www.gnu.org

Language: English - Date: 2012-05-28 13:40:23
307Cryptography / Kerberos / Integrated Windows Authentication / Generic Security Services Application Program Interface / Computer network security / Computing / Computer security

-- -- Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-09-16 20:11:04
308Civil law / Common Access Card / Computer network security / FIPS 201 / Authentication / Kerberos / Multifunction printer / Security / Smart cards / Cryptography

NetgardTM MFD Common Access Card (CAC/PIV) Access to Multi-Function Devices • •

Add to Reading List

Source URL: www.apitech.com

Language: English - Date: 2013-09-03 15:14:51
309

Autenticación Kerberos Neutralidad Subtel - Chile Tabla de Contenidos Tabla de Contenidos Conceptos Principales

Add to Reading List

Source URL: www.subtel.gob.cl

Language: Spanish - Date: 2013-11-18 11:02:00
    310Computer network security / Kerberos / Authentication / Cryptographic nonce / Public-key cryptography / Man-in-the-middle attack / Two-factor authentication / Extensible Authentication Protocol / Cryptography / Security / Cyberwarfare

    CASCADED AUTHENTICATION Karen R. Sollins Massachusetts Institute of Technology Laboratory for Computer Science Cambridge, Ma[removed]

    Add to Reading List

    Source URL: groups.csail.mit.edu

    Language: English - Date: 2010-02-11 13:36:03
    UPDATE