Password authentication protocol

Results: 177



#Item
111Computer network security / Federated identity / Two-factor authentication / Extensible Authentication Protocol / Authentication / Security token / One-time password / Password / Challenge-response authentication / Computer security / Security / Computing

The Evolution of Authentication The Role of Secure Hardware in Overcoming Authentication Challenges Dr. Rolf Lindemann, FIDO Alliance [removed[removed]Middlefield Road Palo Alto

Add to Reading List

Source URL: johnlyle.com

Language: English - Date: 2013-07-18 11:51:33
112Information / Public-key cryptography / Communications protocol / Password-authenticated key agreement / Yahalom / Cryptography / Cryptographic protocols / Data

Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
113Internet standards / Internet protocols / Computing / Authentication protocol / TSIG / Public-key cryptography / Password / Cryptography / Cryptographic protocols / Internet

Automatically Detecting Authentication Limitations in Commercial Security Protocols Stephen H. Brackin  Arca Systems, Inc. 303 E. Yates St. Ithaca, NY 14850

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
114Computer network security / Data security / Software testing / National security / National Archives and Records Administration / Vulnerability / Password / Lightweight Directory Access Protocol / Authentication / Security / Computer security / Cyberwarfare

National Archives and Records Administration 8601 Adelphi Road College Park, Maryland[removed]Date September 4,2008

Add to Reading List

Source URL: www.archives.gov

Language: English - Date: 2009-04-30 14:13:58
115Two-factor authentication / Security token / Cloud computing / Password authentication protocol / Authentication / Symantec / Password / Software token / AKA / Security / Cryptography / Computer security

SOLUTION BRIEF: FIVE KEY IT CHALLENGES ........................................ Securing the New Enterprise: Five Key IT Challenges

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-10-22 08:31:47
116Data / Internet protocols / Cryptographic protocols / Computer network security / Extensible Authentication Protocol / IEEE 802.11r-2008 / RADIUS / Password authentication protocol / Authentication / Wireless networking / Computing / Technology

Using the EAP Framework for Fast Media Independent Handover Authentication∗ Antonio Izquierdo [removed] Katrin Hoeper [removed]

Add to Reading List

Source URL: w3.antd.nist.gov

Language: English - Date: 2009-02-17 16:52:39
117Technology / Federated identity / Government of India / Authentication / Notary / Unique Identification Authority of India / One-time password / Password authentication protocol / E-Government / Security / Access control / Public administration

Conference of State/UT IT Secretaries 11 December 2012 © 2012 NeGD | Public Services closer home

Add to Reading List

Source URL: deity.gov.in

Language: English - Date: 2012-12-17 04:30:42
118Security token / Authentication / Cryptographic protocols / Password authentication protocol / Two-factor authentication / Security and safety features new to Windows Vista / Security / Cryptography / Access control

A Unified Framework for Mobile Device Security Wayne Jansen Serban Gavrila The National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
119Computer security / Electronic authentication / Authentication / Internet protocols / Password authentication protocol / Password / Biometrics / Two-factor authentication / Security token / Security / Access control / Identity management

NIST E-Authentication Guidance SP[removed]Federal PKI TWG Feb. 18, 2004 Bill Burr [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
120Access control / Federated identity / E-Authentication / Public administration / Authentication / Password authentication protocol / Access token / Electronic authentication / Two-factor authentication / Security / Identity management / Computer security

e-Authentication Guidance Bill Burr NIST [removed[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
UPDATE