Key authentication

Results: 993



#Item
751Cryptographic protocols / X.509 / Web.config / Password / Subroutine / PKCS / Public-key cryptography / Computer programming / Computing

If you are a .net user experiencing authentication problems using strong authentication and receiving an error that reads something like this:   Message : WSE567: The incoming Username token must contain both a nonce a

Add to Reading List

Source URL: www.statemef.com

Language: English - Date: 2010-01-11 15:10:03
752Key management / Public-key cryptography / Public key infrastructure / Security token / Digital identity / Entrust / Authentication / Identity theft / Society for Worldwide Interbank Financial Telecommunication / Cryptography / Security / Identity

i2i Karen Wendel Karen Wendel has more than 20 years of experience in financial services, applications development

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:43
753Internet privacy / PKWARE /  Inc / Key management / Email authentication / Internet / Software / Zip / Microsoft Outlook / Email / Computing / Public-key cryptography / PKZIP

DATASHEET: SECUREZIP FOR WINDOWS DESKTOP Save Secure, Send Secure with SecureZIP® Files that contain sensitive data need to be protected. Whether stored on a PC or sent via email

Add to Reading List

Source URL: www.pkware.com

Language: English - Date: 2014-07-07 13:05:05
754Key management / Public-key cryptography / Electronic signature / Digital signature / Authentication / Email / Electronic data interchange / Public key certificate / Electronic Signatures in Global and National Commerce Act / Cryptography / Notary / Electronic documents

Electronic Transactions Law Chapter One Definitions and General Provisions Article (1) In the application of this Law, The following words and expressions shall have the meaning assigned to them, unless the context other

Add to Reading List

Source URL: ita.gov.om

Language: English - Date: 2009-05-11 02:17:10
755Cyberwarfare / Public key infrastructure / Deep packet inspection / Integrated Windows Authentication / Cryptography / Computer network security / Computer security

OSNA (Open Sensor Network Authentication) Ignite Technology Transfer Office | University Road, Galway, Ireland. | phone[removed] | fax[removed]www.osna-solutions.com]

Add to Reading List

Source URL: tto.nuigalway.ie

Language: English - Date: 2014-04-29 03:32:17
756Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

2011 IEEE Symposium on Security and Privacy Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET Juliano Rizzo Netifera

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2011-04-20 04:03:50
757Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-12-02 17:00:16
758Internet standards / Internet protocols / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Man-in-the-middle attack / Key management / Internet / Cryptography / Computing

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prev

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-07-28 17:01:12
759Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
760Merchant services / Business / Secure communication / 3-D Secure / Payment systems / Authentication / Acquiring bank / Public key certificate / Transport Layer Security / Cryptography / Cryptographic protocols / Electronic commerce

J/Secure™ Protocol Specification Ver.1.0 January 2008 2008 JCB Co., Ltd. All rights reserved.

Add to Reading List

Source URL: partner.jcbcard.com

Language: English - Date: 2011-07-08 04:06:09
UPDATE