Kerberos

Results: 405



#Item
51

The Perils of Unauthenticated Encryption: Kerberos Version 4∗ Tom Yu Sam Hartman Kenneth Raeburn Massachusetts Institute of Technology

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2003-11-20 16:34:21
    52Industrial design / Kerberos / Image scanner / Technology / Automatic number plate recognition / Computing / Artificial intelligence / Automatic identification and data capture / 3D scanner

    VOP_podklad_zdroj_bez_pruhu_pro_cd

    Add to Reading List

    Source URL: www.vop.cz

    Language: English - Date: 2015-03-03 06:27:33
    53Prevention / Identity management / Certification Commission for Healthcare Information Technology / CCOW / Information technology security audit / Access control / Password / Audit trail / Kerberos / Security / Computer security / Public safety

    Instructions: Check the appropriate column to indicate the application’s security capabilities. Please provide any additional responses or detailed explanations of other compensating controls as comments. Please numbe

    Add to Reading List

    Source URL: www.himss.org

    Language: English - Date: 2013-02-13 10:28:31
    54Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

    Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2012-01-13 10:28:23
    55Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

    Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2012-01-15 19:52:05
    56Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security

    Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2006-08-23 11:43:55
    57Computer network security / Internet protocols / Internet standards / Directory services / Multi-factor authentication / Authentication / Lightweight Directory Access Protocol / Kerberos / Password / Security / Computer security / Computing

    State of New Mexico Statewide Architectural Configuration Requirement Title: Authentication and Directory Services Standard S-STD001.002 Effective Date: October 18, 2005 1.

    Add to Reading List

    Source URL: www.doit.state.nm.us

    Language: English - Date: 2013-09-24 10:13:21
    58Crime prevention / National security / Computer network security / Electronic commerce / Password / Phishing / Public-key cryptography / Kerberos / Cryptographic hash function / Cryptography / Security / Computer security

    Contents Preface to the Second Edition xxv

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2011-12-05 05:58:34
    59

    Du kannst mehr als nur Scharren & Streicheln? Samba ist für Dich kein Tanz und Kerberos kein Höllenhund?

    Add to Reading List

    Source URL: www.physics.tu-berlin.de

    - Date: 2012-07-04 11:28:39
      60Kerberos / Key / Certificate authority / Symmetric-key algorithm / ID-based encryption / Cryptographic key types / Cryptography / Key management / Public-key cryptography

      This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2011-07-10 02:35:13
      UPDATE