Key distribution center

Results: 73



#Item
31Computer network security / Cryptographic protocols / Key management / ISO standards / Ubiquitous computing / Kerberos / Key distribution center / Smart card / Authentication / Cryptography / Security / Computer security

Security implications in Kerberos by the introduction of smart cards Nikos Mavrogiannopoulos Andreas Pashalidis

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
32Public–private partnership / Government / Public economics / Computer network security / Key distribution center / Key management

Summary: Inquiry into the Mangawhai community wastewater scheme

Add to Reading List

Source URL: oag.govt.nz

Language: English - Date: 2014-04-29 00:45:24
33Cyberwarfare / Computing / Kerberos / Ticket Granting Ticket / Single sign-on / Authentication protocol / Key distribution center / Apple Open Directory / Computer network security / Computer security / Key management

Taming the Beast Assess Kerberos-Protected Networks Emmanuel Bouillon                           

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
34Wireless ad-hoc network / Mobile ad hoc network / Key distribution / ID-based encryption / Public-key cryptography / Wireless sensor network / Support / Routing / Wireless mesh network / Wireless networking / Technology / Telecommunications engineering

Evaluation of Key Management in ad hoc Networks for Emergency and Rescue Operations (Extended Abstract) A. M. Hegland * E. Winjum* Ø. Kure† S.F.Mjølsnes† C. Rong§ P. Spilling* *UniK – University Graduate Center

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2005-12-08 10:12:47
35Computing / Key management / Barcode reader / Barcodes / Barcode / Technology / Universal Serial Bus / Key distribution center / Serial port / Automatic identification and data capture / Computer hardware / Computer network security

REEVISION  1   1.76  

Add to Reading List

Source URL: www.barcodeman.com

Language: English - Date: 2009-03-03 07:14:15
36Cyberwarfare / Computer security / Kerberos / Ticket Granting Ticket / Network file systems / Key distribution center / Server Message Block / Principal / Samba / Computing / Computer network security / Key management

1 Interoperability with Windows using CIFS File Sharing with Kerberos Authentication Jeff Layton

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-06-29 13:16:25
37Cyberwarfare / Kerberos / Ticket / Challenge-response authentication / Alice and Bob / Key distribution center / Public-key cryptography / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Cryptography / Computer network security / Cryptographic protocols

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2005-12-06 23:10:45
38Cyberwarfare / Key management / Kerberos / Key distribution center / Federated identity / Ticket Granting Ticket / Authentication / Ticket / OpenID / Computer network security / Cryptography / Computer security

Building a Better Grid Authentication System with Kerberos David McBride Department of Computing, Imperial College There are issues with GSI

Add to Reading List

Source URL: www.allhands.org.uk

Language: English - Date: 2010-04-07 12:01:06
39Computing / Kerberos / Ticket Granting Ticket / Single sign-on / Key distribution center / Ticket / Authentication protocol / Passwd / Authentication / Computer network security / Cryptography / Computer security

Kerberos in an ISP environment UNIX/Win2K/Cisco > Nicolas FISCHBACH [removed] - http://www.securite.org/nico/ > Sébastien LACOSTE-SERIS

Add to Reading List

Source URL: www.securite.org

Language: English - Date: 2001-05-10 11:35:55
40Key management / Cyberwarfare / Kerberos / Key distribution center / Single sign-on / Ticket Granting Ticket / Ticket / Authentication / Shared secret / Cryptography / Computer network security / Computer security

Cross-realm Kerberos implementations Esan Wit Esan.Wit at os3.nl Mick Pouw Mick.Pouw at os3.nl

Add to Reading List

Source URL: realm-xover.arpa2.net

Language: English - Date: 2014-10-11 16:09:30
UPDATE