Key authentication

Results: 993



#Item
341Computer network security / Contract law / Information technology management / Outsourcing / Service-level agreement / Security token / Information security / Integrated Windows Authentication / Public key infrastructure / Cryptography / Security / Computer security

STANDARD TERMS AND CONDITIONS

Add to Reading List

Source URL: vanguard.business.gov.au

Language: English - Date: 2015-01-22 19:36:59
342Computer security / Email authentication / Email / Cryptographic software / S/MIME / Email encryption / Encryption / Public-key cryptography / IBM Lotus Notes / Cryptography / Computing / Internet privacy

CompanyCRYPT the encryption module for MIMEsweeper CompanyCRYPT at a glance Confidentiality, integrity and authenticity are becoming increasingly important on transmitted information. The same thought that makes you send

Add to Reading List

Source URL: www.companycrypt.com

Language: English - Date: 2012-03-07 04:32:39
343Public-key cryptography / Email authentication / Cryptographic software / PGP / Email / S/MIME / GNU Privacy Guard / Email encryption / PKCS / Cryptography / Computing / Computer security

CompanyCRYPT the encryption module for MIMEsweeper Technical Specifications MIMEsweeper Integration & deployment

Add to Reading List

Source URL: www.companycrypt.com

Language: English - Date: 2012-03-07 06:22:36
344Identification / Surveillance / Fingerprints / Authentication / Password / IPhone / Public key fingerprint / Facial recognition system / Iris recognition / Security / Biometrics / Cryptography

Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption Chandrasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe†, Lorrie Faith Cranor, Marios Savvides Carnegie Mellon

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2015-01-16 16:24:14
345Computing / IEEE 802.11 / Service set / Wireless LAN / Wi-Fi Protected Access / Extensible Authentication Protocol / Wi-Fi / Transmission Control Protocol / Temporal Key Integrity Protocol / Wireless networking / Technology / Cryptography

WiresharkDisplay Filter Field Reference Frame Type/Subtype Management frames Control frames Data frames Association request

Add to Reading List

Source URL: www.willhackforsushi.com

Language: English - Date: 2007-11-05 11:46:25
346Cyberwarfare / Computer security / Kerberos / Ticket Granting Ticket / Network file systems / Key distribution center / Server Message Block / Principal / Samba / Computing / Computer network security / Key management

1 Interoperability with Windows using CIFS File Sharing with Kerberos Authentication Jeff Layton

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-06-29 13:16:25
347Cyberwarfare / Kerberos / Ticket / Challenge-response authentication / Alice and Bob / Key distribution center / Public-key cryptography / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Cryptography / Computer network security / Cryptographic protocols

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2005-12-06 23:10:45
348Cyberwarfare / Key management / Kerberos / Key distribution center / Federated identity / Ticket Granting Ticket / Authentication / Ticket / OpenID / Computer network security / Cryptography / Computer security

Building a Better Grid Authentication System with Kerberos David McBride Department of Computing, Imperial College There are issues with GSI

Add to Reading List

Source URL: www.allhands.org.uk

Language: English - Date: 2010-04-07 12:01:06
349Identification / Surveillance / Cryptography / Human anatomy / Facial recognition system / Public key fingerprint / Authentication / Integrated Automated Fingerprint Identification System / Automated fingerprint identification / Security / Fingerprints / Biometrics

PositiveID+ Valuable Results PositiveID+ offers

Add to Reading List

Source URL: www.dynamicimaging.com

Language: English - Date: 2012-04-16 11:18:46
350Digital signature / Public key certificate / X.509 / Certificate server / Revocation list / Authentication / Certificate authority / Electronic signature / Public key infrastructure / Cryptography / Public-key cryptography / Key management

AuditorePass Order Documents Online Creating a Digitally

Add to Reading List

Source URL: www.auditorepass.com

Language: English - Date: 2009-07-08 14:36:08
UPDATE