Authentication protocols

Results: 771



#Item
501Cryptographic protocols / Spam filtering / Yahoo! / DomainKeys Identified Mail / DomainKeys / S/MIME / Digital signature / Cisco Systems / SMTP / Cryptography / Email authentication / Public-key cryptography

DomainKeys Identified Mail (DKIM) and Certificates

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2006-04-05 05:56:14
502Cryptographic protocols / Password / Password manager / Cryptographic software / Two-factor authentication / Security / Access control / Computer security

Intrusion-Tolerant Password-Enabled PKI Xunhua Wang [removed] Commonwealth Information Security Center & Department of Computer Science

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-30 12:04:54
503Open formats / Web browsers / JSON / Digest access authentication / Representational state transfer / Application programming interface / Hypertext Transfer Protocol / Email / CouchDB / Computing / HTTP / Cryptographic protocols

Freedom Fone 2.S API Documentation Table of Contents Authentication ........................................................................................................................1 Restrict access.......

Add to Reading List

Source URL: www.freedomfone.org

Language: English - Date: 2012-02-27 08:20:08
504Cryptographic protocols / Internet privacy / Email authentication / Public key infrastructure / X.509 / Secure messaging / S/MIME / Public key certificate / XKMS / Cryptography / Public-key cryptography / Key management

Improving Message Security With a Self-Assembling PKI Jon Callas Chief Technical and Security Officer 28 April 2003

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-30 12:04:46
505Internet protocols / Internet standards / Two-factor authentication / Authentication / Smart card / Public key infrastructure / Online Certificate Status Protocol / Password / SCVP / Cryptography / Public-key cryptography / Cryptographic protocols

Smart Card Alliance Comments: Draft FIPS[removed]Usage: Authentication  LaChelle LeVan  Director, Strategic Alliances - Probaris

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-04-21 01:00:00
506Technology / Cryptographic protocols / Computer security / IEEE 802.11 / Wireless security / IEEE 802.1X / Extensible Authentication Protocol / Wi-Fi Protected Access / Wireless access point / Computer network security / Wireless networking / Computing

WLAN Security: Simplifying Without Compromising Ruckus Wireless | White Paper Striking a balance between security

Add to Reading List

Source URL: caleidoscopesolutions.com

Language: English - Date: 2014-07-11 11:22:13
507Cryptographic protocols / Public-key cryptography / Key management / Digital credential / Authentication / Public key certificate / Privacy / Electronic health record / Health Insurance Portability and Accountability Act / Cryptography / Electronic commerce / Identity management

November 29, 2010 David Blumenthal, MD, MPP National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W.

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:27:34
508Internet protocols / Domain name system / Cryptographic protocols / Domain Name System Security Extensions / X.509 / Verisign / Extended Validation Certificate / HTTP Secure / Cryptography / Key management / Public-key cryptography

DANE: TLS Domain Name Authentication using the DNS Itself

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-09 14:55:24
509Cryptographic protocols / Computer network security / Wireless networking / Simple public key infrastructure / Extensible Authentication Protocol / IEEE 802.1X / Transport Layer Security / Authorization certificate / Wireless security / Cryptography / Public-key cryptography / Key management

Greenpass: Decentralized, PKI-based Authorization for Wireless LANs∗ Nicholas C. Goffee, Sung Hoon Kim, Sean Smith, Punch Taylor, Meiyuan Zhao, John Marchesini Department of Computer Science/Dartmouth PKI Lab† Dartmo

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-03-24 17:11:37
510Email / Computer-mediated communication / Cryptographic protocols / Spamming / Spam filtering / DomainKeys Identified Mail / S/MIME / XKMS / Internet security / Cryptography / Computing / Email authentication

Microsoft Word - Achieving Usable Security Using Existing Standards.doc

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2006-02-08 10:31:52
UPDATE