Back to Results
First PageMeta Content
Internet protocols / Network protocols / Tunneling protocols / Computer network security / Point-to-Point Tunneling Protocol / Internet standards / LM hash / Microsoft Point-to-Point Encryption / Password authentication protocol / Computing / Data / Network architecture


Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP) Bruce Schneier Counterpane Systems, 101 East Minnehaha Parkway,
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 152,57 KB

Share Result on Facebook
UPDATE