Authentication protocols

Results: 771



#Item
441Merchant services / 3-D Secure / Authentication / Computer security / CyberSource / Cryptographic protocols / Security

Title Page CyberSource Payer Authentication Using the Simple Order API December 2014

Add to Reading List

Source URL: apps.cybersource.com

Language: English - Date: 2014-12-10 13:03:12
442Cryptographic protocols / Email authentication / Email / Internet standards / S/MIME / X.509 / Cryptographic Message Syntax / MIME / PKCS / Cryptography / Public-key cryptography / Computing

Secure Electronic Mail: It’s Ready for Prime Time Panel Chair Russell Housley, SPYRUS Panelists John Pawling, J.G. Van Dyke & Associates Michael Elkins, Network Associates, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
443Information / Public-key cryptography / Communications protocol / Password-authenticated key agreement / Yahalom / Cryptography / Cryptographic protocols / Data

Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
444Internet standards / Internet protocols / Computing / Authentication protocol / TSIG / Public-key cryptography / Password / Cryptography / Cryptographic protocols / Internet

Automatically Detecting Authentication Limitations in Commercial Security Protocols Stephen H. Brackin  Arca Systems, Inc. 303 E. Yates St. Ithaca, NY 14850

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
445Security / Secure communication / Computer network security / Internet protocols / HTTP / HTTP Secure / Authentication / Opportunistic encryption / Transport Layer Security / Cryptographic protocols / Cryptography / Computing

Trust  Issues  with  Opportunistic  Encryption   Scott  Rose,  Stephen  Nightingale,  Doug  Montgomery   {scottr,  night,  [removed]}   National  Institute  of  Sta

Add to Reading List

Source URL: www.had-pilot.com

Language: English - Date: 2014-03-21 15:07:13
446Internet / Spamming / Computer-mediated communication / Email / Cryptographic protocols / Anti-spam techniques / DMARC / Sender Policy Framework / DomainKeys Identified Mail / Spam filtering / Email authentication / Computing

Meraki 7 dBi 2.4 GHz Omni Antenna (ANT-7DB-OM) Datasheet The Meraki High-Gain Omni-Directional Panel Antenna can help extend the range of a Meraki radio by refocusing the vertical signal to strengthen the horizontal sign

Add to Reading List

Source URL: meraki.cisco.com

Language: English - Date: 2011-07-13 06:04:26
447Internet / Spamming / Computer-mediated communication / Email / Cryptographic protocols / Anti-spam techniques / DMARC / Sender Policy Framework / DomainKeys Identified Mail / Spam filtering / Email authentication / Computing

資料3 Anti-Spam mail Promotion Council • Set up as a venue for a wide range of stakeholders both in private and public sectors interested in anti-spam measures • Engages in various activities including the adopt

Add to Reading List

Source URL: www.dekyo.or.jp

Language: English - Date: 2014-10-21 20:27:26
448Diffie–Hellman key exchange / Public-key cryptography / Key generation / Key authentication / Algorithm / Key / Cryptography / Key management / Cryptographic protocols

An Ecient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups Jim Alves-Foss Center for Secure and Dependable Software University of Idaho

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
449Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Security token / Authentication / Fido / OpenID / Transport Layer Security / Security / Computing / Access control

PDF Document

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-10-20 18:13:20
450Identity management / Two-factor authentication / Security token / Multi-factor authentication / One-time password / Mutual authentication / Authentication / Password / Strong authentication / Security / Access control / Internet protocols

Duo Security Flexible Two-Factor Authentication Your users are under attack

Add to Reading List

Source URL: www.duosecurity.com

Language: English - Date: 2014-01-09 16:52:59
UPDATE