Password Authentication Protocol

Results: 177



#Item
151Internet standards / Security / Lightweight Directory Access Protocol / Internet / Password / Authentication / Json2Ldap / Directory services / Computing / Internet protocols

LDAP Name & EMP ID Look Up Procedures (Lightweight Directory Access Protocol) LDAP is the State of Alaska Employee Directory, available on the State’s web site. Current state employees’ Legal Name and EMP ID (Employe

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2012-07-23 19:47:13
152Internet protocols / Internet standards / Identity management / Security token / Two-factor authentication / One-time password / Revocation list / Lightweight Directory Access Protocol / Identity management system / Cryptography / Public-key cryptography / Key management

plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

Add to Reading List

Source URL: www.planc.biz

Language: English - Date: 2011-01-27 05:18:57
153SPEKE / Password Authenticated Key Exchange by Juggling / Encrypted key exchange / Diffie–Hellman key exchange / Password / Public-key cryptography / IEEE P1363 / Key exchange / Authentication / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password Authenticated Key Exchange by Juggling - A key exchange protocol without PKI

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-16 17:16:56
154Password-authenticated key agreement / Electronic commerce / Password / Two-factor authentication / Man-in-the-middle attack / Biometrics / Security token / RSA / Authentication / Cryptography / Security / Cryptographic protocols

Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke School of Computing Science Newcastle University {feng.hao, dylan.clarke}@ncl.ac.uk

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2012-01-30 18:16:54
155MQV / Key-agreement protocol / Public-key cryptography / Password-authenticated key agreement / Alice and Bob / XTR / Key authentication / Station-to-Station protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / YAK

On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-12-25 18:38:22
156Information / Data / Internet protocols / Password authentication protocol / Protocol

CEGA Conference on Pre-Analysis Plans and Study Registration: Comment Aprajit Mahajan December 7, 2012

Add to Reading List

Source URL: cega.berkeley.edu

Language: English - Date: 2013-03-12 14:04:49
157Internet standards / Internet protocols / Computer network security / Kerberos / Telnet / File Transfer Protocol / Ticket Granting Ticket / Password / Integrated Windows Authentication / Computing / Internet / Network architecture

KTELNET Version[removed] Copyright notice

Add to Reading List

Source URL: www.stacken.kth.se

Language: English - Date: 2000-05-06 14:22:05
158Authentication protocol / Diffie–Hellman key exchange / Public-key cryptography / Password authentication protocol / Random oracle / Key-agreement protocol / Cryptography / Cryptographic protocols / Internet protocols

Authentication for Paranoids: Multi-Party Secret Handshakes Stanislaw Jarecki, Jihye Kim, and Gene Tsudik Computer Science Department University of California, Irvine {stasio, jihyek, gts}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2006-07-12 12:31:28
159Computing / Needham–Schroeder protocol / Near field communication / Communications protocol / Password authentication protocol / Cryptographic protocols / Data / Information

Formally defining NFC M-coupon requirements, with a case study Ali Alshehri, Steve Schneider Dept. of Computing, University of Surrey Guildford GU2 7XH, England Email: [removed] and [removed].

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-12-06 10:43:01
160Computer network security / HTTP / Password / Router / Basic access authentication / Communications protocol / Cross-site request forgery / Wireless security / Computing / Data / Information

Hacking D-Link Routers With HNAP SourceSec Security Research www.sourcesec.com Vulnerability Summary Multiple D-Link routers suffer from insecure implementations of the Home Network Administration

Add to Reading List

Source URL: www.sourcesec.com

Language: English - Date: 2010-01-19 21:58:02
UPDATE