Authentication protocols

Results: 771



#Item
521System software / Internet protocols / Internet standards / Lightweight Directory Access Protocol / Password / Active Directory / Authentication / Password manager / Comparison of mail servers / Directory services / Computing / Security

Responsible Use of University Computing Resources Policy Document Secure Directory Services Access Policy for User Authentication and Authorization 1.0 Purpose

Add to Reading List

Source URL: www.montclair.edu

Language: English - Date: 2014-08-13 13:50:12
522Internet protocols / Internet standards / Network management / System administration / Syslog / SolarWinds / Lightweight Directory Access Protocol / Password / Basic access authentication / Computing / System software / Information technology management

Kiwi Syslog Web Access TM © 2014 SolarWinds, Inc. I

Add to Reading List

Source URL: www.kiwicattools.com

Language: English - Date: 2014-06-06 03:35:29
523Cryptographic protocols / Computer network security / Electronic commerce / IEEE 802.1X / X.509 / Wireless security / Public key infrastructure / Public key certificate / Two-factor authentication / Cryptography / Public-key cryptography / Key management

0363371004B_3e-636S-2_CDART[removed])

Add to Reading List

Source URL: www.ultra-3eti.com

Language: English - Date: 2013-02-20 14:50:26
524Internet standards / Network architecture / Network Time Protocol / Ntpd / Daemon / Time server / Authentication / Email / NTP server misuse and abuse / Internet / Computing / Internet protocols

Microsoft Word - ntp-authenticate-instructions.doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-07-21 16:47:15
525Access control / Identity management / Cryptographic protocols / Authentication / Notary / FIPS 201 / Electronic authentication / X.509 / Smart card / Cryptography / Security / Public-key cryptography

How to Achieve “Rapid Electronic Authentication” Kevin Kozlowski Vice President, Government Initiatives XTec Incorporated

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-05-09 01:00:00
526Notary / Marketing / Coprocessor / Tamper resistance / Smart card / Electronic money / Digital signature / United States Postal Service / Authentication / Cryptography / Cryptographic protocols / Packaging

In Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp[removed]Secure Coprocessors in Electronic Commerce Applications Bennet Yee J. D. Tygar Microsoft Corporation Carnegie Mellon University

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2005-08-30 07:21:00
527Computing / Telecommunications engineering / Protected Extensible Authentication Protocol / IEEE 802.1X / Wi-Fi / Service set / Wireless LAN / Cryptographic protocols / Extensible Authentication Protocol / Wireless networking / Computer network security / Technology

Microsoft Word - Other Devices.docx

Add to Reading List

Source URL: www.sonoma.edu

Language: English - Date: 2013-02-05 15:53:27
528Data synchronization / Cryptography / Theory of computation / Server / Barbara Jane Liskov / Secret sharing / Byzantine fault tolerance / Replication / Proactive secret sharing / Computing / Fault-tolerant computer systems / Cryptographic protocols

Authentication in a Reconfigurable Byzantine Fault Tolerant System by Kathryn Chen Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: pmg.lcs.mit.edu

Language: English - Date: 2005-01-26 20:47:49
529Computing / Wireless / Cryptographic protocols / Wi-Fi / Service set / Wi-Fi Protected Access / Extensible Authentication Protocol / IEEE 802.11 / Wireless LAN / Wireless networking / Technology / Computer network security

Privacy-Preserving[removed]Access-Point Discovery Janne Lindqvist∗§ Tuomas Aura‡∗ George Danezis‡ Teemu Koponen† Annu Myllyniemi∗ Jussi Mäki∗ Michael Roe‡ ABSTRACT It is usual for[removed]WLAN clients to

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-09-14 15:06:11
530Computer network security / Computing / Cryptographic protocols / Service set / Wi-Fi Protected Access / Extensible Authentication Protocol / Wireless LAN / Hacking / Wireless access point / Wireless networking / Technology / Wireless

Privacy-Preserving[removed]Access-Point Discovery (full version) Microsoft Research Technical Report MSR-TR[removed]January 2009 Janne Lindqvist Helsinki University of Technology (TKK), Finland

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-09-14 15:06:02
UPDATE