Kerberos

Results: 405



#Item
381

Kerberos Single Sign On Benutzerauthentisierung

Add to Reading List

Source URL: www.hznet.de

Language: German - Date: 2005-11-30 08:43:36
    382PKCS / Cryptographic protocols / Generic Security Services Application Program Interface / Kerberos / BioAPI / Smart card / X.509 / International Organization for Standardization / Cryptography / Public-key cryptography / Internet standards

    報告書テンプレート

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-06-07 05:24:25
    383Philosophical logic / Formal languages / Predicate logic / Burrows–Abadi–Needham logic / Interpretation / Modal logic / First-order logic / Kerberos / Substitution / Logic / Propositional calculus / Model theory

    IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 39, NO. 4, AUGUST[removed]

    Add to Reading List

    Source URL: www98.griffith.edu.au

    Language: English - Date: 2010-06-29 02:42:57
    384Cyberwarfare / Kerberos / Authentication server / Ticket / Project Athena / Authentication / Integrated Windows Authentication / Generic Security Services Application Program Interface / Computer network security / Computing / Computer security

    PROJECT ATHENA TECHNICAL PLAN Section E.2.1

    Add to Reading List

    Source URL: web.mit.edu

    Language: English - Date: 2000-01-05 22:11:11
    385Information / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Yahalom / Wide Mouth Frog protocol / Replay attack / Public-key cryptography / Kerberos / Cryptographic nonce / Cryptographic protocols / Cryptography / Data

    Pranav Vyas, Dr. Bhushan Trivedi / International Journal of Engineering Research and Applications (IJERA) ISSN: [removed]www.ijera.com

    Add to Reading List

    Source URL: www.ijera.com

    Language: English - Date: 2012-11-17 00:05:41
    386First-order logic / Needham–Schroeder protocol / Kerberos / Cyberwarfare / Mathematics / Burrows–Abadi–Needham logic / Cryptography / Logic

    A Logic of Authentication M. Burrows, M. Abadi, R. Needham Robert Harper

    Add to Reading List

    Source URL: www.cs.cmu.edu

    Language: English - Date: 2007-09-13 10:55:29
    387Computer security / Kerberos / Ticket Granting Ticket / Key distribution center / Single sign-on / Authentication server / Ticket / Secure Shell / Network Information Service / Computing / Computer network security / Cryptography

    The MIT Kerberos Administrator’s How-to Guide Protocol, Installation and Single Sign On By Jean-Yves Migeon

    Add to Reading List

    Source URL: www.kerberos.org

    Language: English - Date: 2008-07-23 12:35:04
    388Computing / FreeIPA / Kerberos / Single sign-on / Lightweight Directory Access Protocol / Active Directory / Samba / Identity management / Apple Open Directory / Directory services / System software / Software

    IPA – Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat

    Add to Reading List

    Source URL: www.redhat.com

    Language: English - Date: 2008-06-26 17:55:47
    389Alice and Bob / Ciphertext / RSA / Kerberos / XTR / Needham–Schroeder protocol / Security protocol notation / Cryptography / Cryptographic protocols / Public-key cryptography

    Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2006-07-26 10:17:27
    390Network File System / Internet / Directory services / Lightweight Directory Access Protocol / File system / Kerberos / Internet protocols / Computing / Network architecture

    NFSv3 to NFSv4 Migration Guide Author: Vincent Roqueta Contributors: Tony Reix

    Add to Reading List

    Source URL: nfsv4.bullopensource.org

    Language: English - Date: 2005-12-15 10:57:34
    UPDATE