Authentication protocols

Results: 771



#Item
461Cryptographic protocols / Message authentication codes / Hashing / Internet protocols / HMAC / SHA-2 / Cryptographic hash function / Authentication / Label Distribution Protocol / Cryptography / Computing / Network architecture

Internet Engineering Task Force (IETF) Request for Comments: 7349 Category: Standards Track ISSN: [removed]L. Zheng

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-08-14 14:33:49
462Internet standards / Internet protocols / Security / Lightweight Directory Access Protocol / Identity management / Authentication / Email / Computing / Directory services / Internet

Exhibit A Request for access to UNMC Identity Management services Please read through the entire form before completing. You must complete a new form (separate request) for each project. All needed signatures need to be

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-11-08 14:08:51
463Notary / Cryptographic protocols / Electronic signature / Public key certificate / Digital signature / X.509 / Identity document / Signature / Authentication / Cryptography / Public-key cryptography / Key management

Microsoft Word - Electronic Signatures Standard.docx

Add to Reading List

Source URL: www.dis.arkansas.gov

Language: English - Date: 2014-03-20 10:22:14
464Cyberwarfare / Tunneling protocols / Virtual private networks / Internet privacy / Network architecture / OpenVPN / RADIUS / ESET / Two-factor authentication / Computing / Computer network security / Computer security

ESETNA-5847-VPN Flyer for RSA-HIMSS-v2[removed]indd

Add to Reading List

Source URL: static2.esetstatic.com

Language: English - Date: 2014-02-11 15:29:48
465Internet protocols / Internet / Virtual private networks / Tunneling protocols / Cryptographic protocols / IPsec / RADIUS / OpenVPN / Layer 2 Tunneling Protocol / Computing / Network architecture / Computer network security

Configuration Aid To Ingate Firewall/SIParator - How to Set Up an IPsec Connection with RADIUS Authentication Lisa Hallingström Ingate Systems AB

Add to Reading List

Source URL: www.ingate.com

Language: English - Date: 2008-05-07 11:25:40
466Data / Internet / Secure Hypertext Transfer Protocol / Hypertext Transfer Protocol / HTTP Secure / MIME / Cryptographic Message Syntax / IPsec / Digest access authentication / Cryptographic protocols / Computing / HTTP

Network Working Group Request for Comments: 2660 Category: Experimental E. Rescorla RTFM, Inc.

Add to Reading List

Source URL: rfc.askapache.com

Language: English
467Computer security / Internet standards / Cryptographic protocols / Security / Two-factor authentication / Authentication

FIDO U2F Raw Message Formats

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-02-10 21:58:20
468Computer networking / Network performance / Network architecture / Proxy server / Internet protocols / Proxy auto-config / SOCKS / Basic access authentication / Web Proxy Autodiscovery Protocol / Computing / Internet privacy / Internet

Cisco AsyncOS for Web User Guide[removed]Published: March 17, 2014 Cisco Systems, Inc. www.cisco.com

Add to Reading List

Source URL: www.cisco.com

Language: English
469Directory services / Identity management / Federated identity / Internet standards / Internet protocols / Lightweight Directory Access Protocol / Authentication / Information security / Federated identity management / Security / Computer security / Computing

Authentication Services Information Technology Services Effective Date: [removed]Reviewed Dates:

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-11-21 12:33:08
470Security / Computing / Information / Metadata / Open Archives Initiative Protocol for Metadata Harvesting / Open access / Access token / Authentication / User / Archival science / Digital libraries / Internet protocols

Requester Information Name: E-Mail: Position:

Add to Reading List

Source URL: www.ands.org.au

Language: English - Date: 2011-09-25 21:47:49
UPDATE