Authentication protocols

Results: 771



#Item
421Access control / Zero-knowledge proof / Commitment scheme / IP / Authentication / Public-key cryptography / Cryptography / Cryptographic protocols / Proof of knowledge

BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation Man Ho Au,† Apu Kapadia,‡ Willy Susilo† † Centre for Computer and Information Security Research

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2014-08-19 21:15:38
422Proof of knowledge / Public-key cryptography / Authentication / Zero-knowledge proof / Commitment scheme / IP / Cryptography / Cryptographic protocols / Access control

BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation Man Ho Au,† Apu Kapadia,‡ Willy Susilo† † Centre for Computer and Information Security Research

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2012-10-11 17:03:20
423Wireless / Mobile technology / Wireless networking / Internet Protocol / Videotelephony / System Architecture Evolution / Extensible Authentication Protocol / 3GPP / User equipment / Technology / Software-defined radio / Universal Mobile Telecommunications System

TS[removed]V12[removed]Universal Mobile Telecommunications System (UMTS); LTE; 3GPP system to Wireless Local Area Network (WLAN) interworking; WLAN User Equipment (WLAN UE) to network protocols; Stage 3 (3GPP TS[removed]

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-10-03 05:12:17
424Email / Computing / Spamming / Cryptographic protocols / Yahoo! / DomainKeys Identified Mail / DMARC / Sender Policy Framework / Sender ID / Email authentication / Spam filtering / Computer security

Technology Brief SPF, DKIM, and DMARC Demystified The what, why, and how of email sender identity technologies

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-30 13:03:32
425Internet / Email / OSI protocols / Cryptographic protocols / Yahoo! / DomainKeys Identified Mail / Bitly / Simple Mail Transfer Protocol / MIME / Email authentication / Computing / Spam filtering

Email Authentication Academy Handout: compilation of relevant standards & their normative references https://otalliance.org/resources/authentication/index.html Updated March 4, [removed])

Add to Reading List

Source URL: otalliance.org

Language: English - Date: 2015-01-15 18:49:49
426Spam filtering / Internet protocols / Computer security / Spamming / Cryptographic protocols / DomainKeys Identified Mail / DMARC / Domain Name System Security Extensions / Email / Internet / Email authentication / Computing

2014 Online Trust Audit & Honor Roll Briefing David Ader, Program Manager Jeff Wilbur, VP Marketing, Iconix Craig Spiezle, Executive Director & President, OTA

Add to Reading List

Source URL: otalliance.org

Language: English - Date: 2015-01-15 21:16:42
427Internet standards / Data / Internet / OAuth / Simple Authentication and Security Layer / Datagram Transport Layer Security / Transport Layer Security / Extensible Authentication Protocol / Generic Security Services Application Program Interface / Internet protocols / Cryptographic protocols / Computing

Independent Submission Request for Comments: 7397 Category: Informational ISSN: [removed]J. Gilger

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-12-12 19:53:40
428Internet protocols / System software / Internet standards / Lightweight Directory Access Protocol / Password / OpenLDAP / Active Directory / Cryptographic protocols / HTTP+HTML form-based authentication / Directory services / Computing / Software

Unauthenticated Authentication: Null Bytes and the Affect on Web-based Applications which Use LDAP Alex Everett, CISSP IT Information Security Office Oklahoma State University December 2006

Add to Reading List

Source URL: net.educause.edu

Language: English - Date: 2007-03-20 11:53:12
429Cryptographic protocols / Public-key cryptography / Key management / Digital credential / Authentication / Public key certificate / Privacy / Electronic health record / Health Insurance Portability and Accountability Act / Cryptography / Electronic commerce / Identity management

November 29, 2010 David Blumenthal, MD, MPP National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W.

Add to Reading List

Source URL: healthit.gov

Language: English - Date: 2013-08-15 17:27:34
430Computing / Computer security / Spamming / Internet protocols / DomainKeys Identified Mail / DMARC / Sender Policy Framework / Domain Name System / Phishing / Email authentication / Spam filtering / Email

2014 Email Integrity Audit Fighting Malicious & Deceptive Email August 13, 2014 Craig Spiezle Executive Director & President, OTA

Add to Reading List

Source URL: otalliance.org

Language: English - Date: 2015-01-16 03:19:35
UPDATE