Authentication protocols

Results: 771



#Item
481Internet protocols / Security token / One-time password / Two-factor authentication / Password / ESET / RADIUS / Password manager / ESET NOD32 / Computer security / Security / Access control

Solutions Overview Proven. Trusted. ESET Secure Authentication ESET Secure Authentication protects passwords and prevents data breaches

Add to Reading List

Source URL: static1.esetstatic.com

Language: English - Date: 2013-02-21 10:15:14
482Security token / Authentication / Cryptographic protocols / Password authentication protocol / Two-factor authentication / Security and safety features new to Windows Vista / Security / Cryptography / Access control

A Unified Framework for Mobile Device Security Wayne Jansen Serban Gavrila The National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
483Cryptographic protocols / Public-key cryptography / Key management / Digital credential / Authentication / Public key certificate / Privacy / Electronic health record / Health Insurance Portability and Accountability Act / Cryptography / Electronic commerce / Identity management

November 29, 2010 David Blumenthal, MD, MPP National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W.

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:27:34
484Andrew File System / Carnegie Mellon University / Cache / Burrows–Abadi–Needham logic / Internet Relay Chat / Transmission Control Protocol / OSI protocols / Internet / Computing / Network file systems / Online chat

Using Belief to Reason About Cache Coherence L. Mummert, J.M. Wing, and M. Satyanarayanan Carnegie Mellon University Abstract The notion of belief has been useful in reasoning about authentication protocols. In this pape

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 1999-07-15 13:31:57
485Email / Spamming / Computing / Cryptographic protocols / Yahoo! / DomainKeys Identified Mail / DMARC / Sender Policy Framework / DomainKeys / Email authentication / Spam filtering / Computer security

Elements Signage OTA NEW 2013

Add to Reading List

Source URL: otalliance.org

Language: English - Date: 2014-11-20 06:26:44
486Message authentication codes / HMAC / Internet protocols / Cryptographic hash functions / Cryptographic protocols / Collision attack / MD4 / MD5 / SHA-1 / Cryptography / Error detection and correction / Hashing

Forgery and Partial Key Recovery attacks on HMAC and NMAC using Hash Collisions 2nd NIST Hash Function Workshop Scott Contini Macquarie University

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:27:16
487Cryptographic protocols / Data / Information / Internet protocols / Extensible Authentication Protocol / Wireless security / Wi-Fi Protected Access / TACACS+ / TACACS / Computer network security / Computing / Wireless networking

FIPS[removed]Security Policy for Cisco 4402 and 4404 Wireless LAN Controllers Feb 05, 2014 Version 4.1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-10 13:05:34
488Computer security / Cryptographic protocols / XKMS / Transport Layer Security / Security Assertion Markup Language / Network security / Network service / Authentication / Security service / Cryptography / Computer network security / Computing

NATIONAL ENVIRONMENTAL INFORMATION EXCHANGE NETWORK

Add to Reading List

Source URL: www.exchangenetwork.net

Language: English - Date: 2005-03-16 16:00:42
489Message authentication codes / Internet protocols / Secure communication / Block cipher / Key Wrap / Data Encryption Standard / SHA-2 / HMAC / Digital signature / Cryptography / Cryptographic software / Cryptography standards

NIST Cryptographic Standards Program Bill Burr [removed] Dec 4, 2002

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-04 01:00:00
490Computer security / Electronic authentication / Authentication / Internet protocols / Password authentication protocol / Password / Biometrics / Two-factor authentication / Security token / Security / Access control / Identity management

NIST E-Authentication Guidance SP[removed]Federal PKI TWG Feb. 18, 2004 Bill Burr [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
UPDATE