Authentication protocols

Results: 771



#Item
491Directory services / Computer network security / Internet protocols / Internet standards / Windows Server / Single sign-on / Integrated Windows Authentication / Active Directory / Metadirectory / Computing / Software / System software

Agenda Single Sign-on and Identity Management Joe Donahue

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
492IEEE standards / Password / Zero-knowledge password proof / Challenge-response authentication / IEEE P1363 / Public-key cryptography / Password-authenticated key agreement / Password manager / Cryptography / Security / Cryptographic protocols

IEEE P1363.2: Password-based Cryptography David Jablon CTO, Phoenix Technologies NIST PKI TWG - July 30, 2003

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
493Information / Internet standards / Computer network security / Wireless networking / HTTP / RADIUS / Password authentication protocol / IEEE 802.1X / Password / Computing / Internet protocols / Data

THE FREERADIUS IMPLEMENTATION GUIDE CHAPTER 5 - BASIC AUTHENTICATION METHODS THE PROCESS Chapter 5 - Basic Authentication Methods

Add to Reading List

Source URL: networkradius.com

Language: English - Date: 2014-11-18 17:11:15
494Data / Information / Computer network security / Internet protocols / Extensible Authentication Protocol / IEEE 802.1X / Wireless security / Xsupplicant / FreeRADIUS / Computing / Cryptographic protocols / Wireless networking

THE FREERADIUS IMPLEMENTATION GUIDE CHAPTER 6 - EAP AUTHENTICATION THE PROCESS Chapter 6 - EAP Authentication

Add to Reading List

Source URL: networkradius.com

Language: English - Date: 2014-11-18 17:11:15
495Security / Hashing / Cryptographic nonce / HTTP / Cryptographic hash function / Block cipher modes of operation / HMAC / Password / Authentication / Cryptography / Cryptographic protocols / Message authentication codes

M3DA Security Extension This is a draft document M3DA Security Extension Document history Date

Add to Reading List

Source URL: wiki.eclipse.org

Language: English - Date: 2013-01-28 15:59:57
496Eduroam / Security / Internet protocols / IEEE 802.1X / RADIUS / Authentication / Network service / Computing / Computer network security / Computer security

EDUROAM National policy for Armenia version 1.0

Add to Reading List

Source URL: eduroam.am

Language: English - Date: 2012-07-17 08:18:06
497Cryptographic primitive / Random oracle / Man-in-the-middle attack / Transport Layer Security / Password / Cryptographic hash function / Key / Secure Shell / Deniable authentication / Cryptography / Cryptographic protocols / Secure communication

Report on DIMACSāˆ— Workshop on Cryptography: Theory Meets Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the PORTIA project. Date of Workshop: October 14

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-15 15:00:33
498Computer network security / Simple public key infrastructure / Cryptographic protocols / Authorization certificate / RADIUS / Wireless security / X.509 / IEEE 802.1X / Authentication / Cryptography / Key management / Public-key cryptography

Greenpass: Decentralized, PKI-Based Authorization for Wireless LANs Nicholas C. Goffee, Sung Hoon Kim, Sean Smith, Punch Taylor, Meiyuan Zhao, John Marchesini Department of Computer Science Dartmouth College

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-04-13 10:51:19
499Public-key cryptography / Internet protocols / Internet standards / Key management / Directory services / Integrated Windows Authentication / Single sign-on / RADIUS / Kerberos / Cryptography / Computing / Microsoft Windows

Microsoft Word - ANLPKIAppV60Final.doc

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-12 18:50:30
500Email / Internet standards / Online chat / Cryptographic protocols / Secure messaging / Transport Layer Security / Public key infrastructure / Two-factor authentication / Instant messaging / Cryptography / Computing / Public-key cryptography

On Securing the Public Health Information Network Messaging System

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-03-07 13:17:14
UPDATE