Authentication protocols

Results: 771



#Item
411Computer networking / Internet protocols / Internet privacy / Network performance / Password authentication protocol / Proxy server / Access Point Name / Multimedia Messaging Service / IP address / Technology / Computing / Mobile technology

iPhone Internet i MMS nagoduvawa 1

Add to Reading List

Source URL: www.vip.mk

Language: English - Date: 2013-01-18 06:27:56
412Cryptographic hash functions / Hashing / SHA-2 / Transport Layer Security / SHA-1 / HMAC / Message authentication code / Collision attack / Key size / Cryptography / Cryptographic protocols / Internet protocols

Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Add to Reading List

Source URL: systems.hscic.gov.uk

Language: English
413Tunneling protocols / Internet privacy / Network architecture / Computer security / Crypto-anarchism / Virtual private network / Cisco Systems VPN Client / Cisco Systems / Two-factor authentication / Computer network security / Computing / System software

Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication for your accou

Add to Reading List

Source URL: www.urmc.rochester.edu

Language: English - Date: 2014-10-27 10:49:52
414Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / HMAC / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 4500 FIPS[removed]Security Policy v2-4v2 with gtk comments.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 17:35:30
415Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / Cryptographic Module Validation Program / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 3820 FIPS[removed]Security Policy v2-3.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 14:34:44
416Cryptographic protocols / HTTP / Two-factor authentication / Password / Security token / Keystroke logging / Authentication / HTTP Secure / Transaction authentication number / Security / Cryptography / Computer security

YubiKey Security Evaluation Discussion of security properties and best practices Version: 2.0.1

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:04:59
417One-time password / Internet protocols / HOTP / USB / Two-factor authentication / Universal Serial Bus / Non-volatile memory / USB human interface device class / USB flash drive / Computer security / Computing / Security

The YubiKey Manual Usage, configuration and introduction of basic concepts Date: 17th Version: 3.3

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-10-17 14:55:11
418Internet protocols / Security token / One-time password / Two-factor authentication / Password / ESET / RADIUS / Password manager / ESET NOD32 / Computer security / Security / Access control

Solutions Overview Proven. Trusted. ESET Secure Authentication ESET Secure Authentication protects passwords and prevents data breaches

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2013-02-21 10:15:14
419Direct Anonymous Attestation / Internet privacy / Civil law / Authentication / Computer security / AKA / Cryptographic protocols / Security / Cryptography

Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs Patrick P. Tsang† , Man Ho Au§ , Apu Kapadia†‡ , Sean W. Smith† † Department of Computer Science

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2007-09-30 19:44:28
420Security / Tunneling protocols / Internet protocols / One-time password / Two-factor authentication / Security token / Password / OpenVPN / ESET / Computing / Computer security / Computer network security

Solutions Overview ESET Secure Authentication ESET Secure Authentication protects passwords and prevents data breaches Weak passwords cause real problems. With millions of passwords compromised each year, many companie

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2014-12-22 12:39:49
UPDATE