Authentication protocols

Results: 771



#Item
431Message authentication codes / HMAC / Hashing / Advanced Encryption Standard / FIPS 140 / Key / Transport Layer Security / Cryptography / Cryptography standards / Cryptographic protocols

Barco ICMP FIPS[removed]Non-Proprietary Security Policy ICMP Barco ICMP FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:48:39
432Computer security / Unix / Internet protocols / Shadow password / Challenge-response authentication / Password / Access control / Security

Overview of Red Database 2.5 Roman Simakov, director of system development department RED SOFT CORPORATION About company

Add to Reading List

Source URL: www.firebirdsql.org

Language: English - Date: 2014-11-20 13:08:16
433Cryptographic protocols / Authenticator / Two-factor authentication / Security token / Authentication / Fido / AKA / IEEE 802.1X / Security / Access control / Cryptography

FIDO Technical Glossary FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps[removed]/fido-glossary-v1.0-ps20141208.html Previous version: https://fidoallianc

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-12-08 17:39:04
434Computing / Authenticator / Authentication / Password authentication protocol / Password / Internet protocols / Security / Cryptography

FIDO UAF Protocol Specification v1.0 FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps[removed]/fido-uaf-protocol-v1.0-ps[removed]html Previous version: h

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-12-08 17:39:26
435Information / Internet of Things / Extensible Authentication Protocol / 6LoWPAN / Constrained Application Protocol / Transport Layer Security / IPsec / Internet security / Internet Key Exchange / Cryptographic protocols / Computing / Data

Security Challenges in the IP-based Internet of Things∗ Tobias Heer∗ , Oscar Garcia-Morchon† , Ren´e Hummen∗ , Sye Loong Keoh† , Sandeep S. Kumar† , and Klaus Wehrle∗ ∗

Add to Reading List

Source URL: iotsecuritylab.com

Language: English - Date: 2014-08-14 00:21:28
436Cryptographic protocols / Email / Computing / Computer-mediated communication / Spamming / Spam filtering / Email authentication / Computer security

MN MESSAGE SENDER CERTIFICATION Everbridge MN Message Sender Certification enables users to demonstrate their knowledge of the range of features in Everbridge Mass Notification, how to use them, and the best practices f

Add to Reading List

Source URL: fbf1c3d6e5ac90240faf-0357db950fbb26a08f45323bec4b9c51.r77.cf2.rackcdn.com

Language: English - Date: 2014-08-20 10:39:23
437WLAN Authentication and Privacy Infrastructure / Science / Mathematical sciences / Business / Export of cryptography in the United States / Cryptographic protocols / Cryptography / Non-tariff barriers to trade

Why Do We Need Encryption Rules in the TPP? Takaaki Sashida1| September 2013 A key priority for the U.S. semiconductor industry regarding the Trans-Pacific Partnership (TPP) Agreement currently

Add to Reading List

Source URL: www.semiconductors.org

Language: English - Date: 2013-09-24 16:48:12
438Internet / Security / Email authentication / Cryptographic protocols / Computer security / IPsec / S/MIME / Email encryption / Virtual private network / Computing / Computer network security / Internet privacy

Position  paper  submission  for  W3C/IAB  workshop  on  Strengthening  the   Internet  Against  Pervasive  Monitoring  (STRINT)1   Andrei Robachevsky, Christine Runnegar, Karen

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
439Email / Computer-mediated communication / Cryptographic protocols / Spamming / MDaemon / Sender Policy Framework / DomainKeys Identified Mail / DMARC / SMTP Authentication / Email authentication / Spam filtering / Computing

MDaemon Messaging Server - Email Server Settings - Best Practices Guide

Add to Reading List

Source URL: static.altn.com

Language: English - Date: 2014-10-27 16:13:30
440Security / RADIUS / Internet / Authentication / Mulungushi University / AAA protocol / IEEE 802.1X / Computing / Eduroam / Internet protocols

Benefits and Challenges of Education Roaming (eduroam) to ZAMREN Member Institutions Presenter: Christopher Chembe Mulungushi University

Add to Reading List

Source URL: www.ubuntunet.net

Language: English - Date: 2014-11-21 10:31:34
UPDATE