Password authentication protocol

Results: 177



#Item
161Biometrics / Two-factor authentication / Authentication / Security token / Keystroke dynamics / Risk-based authentication / Password authentication protocol / Password / Information security / Security / Cryptography / Access control

Alternative authentication – what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount

Add to Reading List

Source URL: www.chyp.com

Language: English - Date: 2013-12-13 13:58:42
162Password / Secure Password Authentication / Post Office Protocol / Computer security / Windows Live ID / Two-factor authentication / Computing / Email / Internet

Cannot receive email Cannot receive email with error number 0x800CCC18 Full error message:

Add to Reading List

Source URL: www.expressdata.co.th

Language: English - Date: 2014-02-20 04:32:41
163Privacy / Radio-frequency identification / Wireless / Technology / Computing / ISO/IEC / Password authentication protocol / ISO/IEC 18000-3 / Message authentication codes / Cryptography / Automatic identification and data capture

Secure UHF Tags with Strong Cryptography Development of ISO/IEC[removed]Compatible Secure RFID Tags and Presentation of First Results Walter Hinz, Klaus Finkenzeller and Martin Seysen Giesecke & Devrient GmbH, Prinzrege

Add to Reading List

Source URL: www.rfid-handbook.de

Language: English - Date: 2013-04-26 03:48:58
164Computer-mediated communication / Simple Mail Transfer Protocol / The Bat! / Post Office Protocol / SMTP Authentication / Password / Mail / Email / Software / Computing

The Bat! Voyager © [removed]RITLabs I The Bat! Voyager

Add to Reading List

Source URL: www.ritlabs.com

Language: English - Date: 2014-03-06 03:40:44
165Computer security / Cyberwarfare / OpenVPN / Virtual private network / Two-factor authentication / Point-to-Point Tunneling Protocol / One-time password / Password / DrayTek / Computer network security / Tunneling protocols / Computing

Microsoft Word - 如何使用mOTP應用於SmartVPN Client撥打 VPN Tunnel_英文版_.doc

Add to Reading List

Source URL: www.draytek.co.za

Language: English - Date: 2010-07-02 05:25:28
166Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-12-02 17:00:16
167Home automation / Telecommunications engineering / Internet protocols / Z-Wave / Cryptographic protocols / ZigBee / Password authentication protocol / Transmission Control Protocol / Bluetooth / Wireless networking / Technology / Computing

Security Evaluation of the Z-Wave Wireless Protocol

Add to Reading List

Source URL: research.sensepost.com

Language: English - Date: 2013-08-14 07:38:54
168Information / Cryptographic protocols / Computer network security / Internet protocols / Extensible Authentication Protocol / Password authentication protocol / RADIUS / Authentication protocol / Kerberos / Computing / Wireless networking / Data

Man-in-the-Middle in Tunneled Authentication Protocols N. Asokan, Valtteri Niemi, Kaisa Nyberg Nokia Research Center, Finland

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-11-13 05:00:33
169Cryptographic protocols / Data / Internet protocols / CRAM-MD5 / Digest access authentication / Simple Authentication and Security Layer / Lightweight Directory Access Protocol / Transport Layer Security / Password / Computing / Internet standards / Internet

SCRAM in LDAP Better Password-based Authentication Kurt Zeilenga

Add to Reading List

Source URL: people.apache.org

Language: English - Date: 2011-10-12 12:20:00
170Cryptography / Technology / Cryptographic protocols / IEEE 802.11 / Extensible Authentication Protocol / Wired Equivalent Privacy / Password authentication protocol / Wireless access point / Integrated Windows Authentication / Wireless networking / Computer network security / Computing

Your[removed]Wireless Network has No Clothes∗ William A. Arbaugh Narendar Shankar

Add to Reading List

Source URL: WWW.cs.umd.edu

Language: English - Date: 2001-08-11 18:26:34
UPDATE