Password authentication protocol

Results: 177



#Item
61Internet / Internet privacy / Cryptographic protocols / Internet standards / Password authentication protocol / Network protocols / SOCKS / Transmission Control Protocol / Proxy server / Computing / Internet protocols / Network architecture

ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship Philipp Winter Tobias Pulls

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-26 09:37:41
62Internet / Internet privacy / Computer network security / SOCKS / Skype protocol / Internet standards / Transmission Control Protocol / Password authentication protocol / Deep packet inspection / Computing / Internet protocols / Network architecture

arXiv:submit[removed]cs.CR] 14 May[removed]ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship Philipp Winter

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-26 09:37:41
63Wireless networking / Password / Security / IEEE 802.1X / Protected Extensible Authentication Protocol / Login / Wi-Fi / Wireless security / Wpa supplicant / Computing / Computer network security / Computer security

Procedure to configure Windows XP with SP3 to support HPSHCC WiFi 1 2 3

Add to Reading List

Source URL: hkuspace-plk.hku.hk

Language: English - Date: 2015-02-11 04:25:27
64Network protocols / Embedded systems / UniPro / Transmission Control Protocol / Traffic flow / Client-side / Password authentication protocol / Trivial File Transfer Protocol / TCP delayed acknowledgment / Computing / Network architecture / OSI protocols

Embedded Network Protocols for Mobile Devices Despo Galataki1,2 , Andrei Radulescu2 , Kees Verstoep1 , and Wan Fokkink1 1 VU University, Dept. Computer Science, Amsterdam, The Netherlands 2

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2010-07-05 05:34:30
65Internet protocols / Challenge-response authentication / Authentication / Password authentication protocol / Password / Security / Cryptography / Computer security

Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) Philippe Golle Palo Alto Research Center [removed]

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-03-09 13:40:40
66Diffie–Hellman key exchange / Secure Remote Password protocol / Encrypted key exchange / Public-key cryptography / Internet Key Exchange / Salt / SPEKE / Password-authenticated key agreement / Cryptographic protocols / Cryptography / Password

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
67Computer-mediated communication / Spamming / Anti-spam techniques / Spam filtering / Post Office Protocol / Transport Layer Security / Password / Email authentication / Email client / Email / Computing / Internet

Security Features XGen Plus Security Features

Add to Reading List

Source URL: www.xgen.in

Language: English - Date: 2014-12-17 07:42:25
68Information Card / Authentication / Service-oriented architecture / Password authentication protocol / Security / Federated identity / Computer security

PDF Document

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2014-06-11 06:27:08
69IEEE 802.1X / Password / PROFINET / Extensible Authentication Protocol / Link Layer Discovery Protocol / Technology / Computing / Computer network security

LanExpert 85 Revision History Version 2.02 This release removes the ERASE ALL MEMORY capability which made the unit not useable. Version 2.01 Internal Clean up of 2.00 version Version 2.00

Add to Reading List

Source URL: www.psiber.com

Language: English - Date: 2012-05-15 14:33:45
70Cryptography / Challenge-response authentication / Password / Oracle Database / Computer network security / Internet protocols / Kerberos / Password authentication protocol / Cryptographic protocols / Computing / Data

Oracle authentication László Tóth [removed] Disclaimer

Add to Reading List

Source URL: soonerorlater.hu

Language: English - Date: 2010-03-21 10:35:17
UPDATE