Authentication protocols

Results: 771



#Item
531Internet standards / Internet protocols / HTTP / Password / File Transfer Protocol / Basic access authentication / Default / Representational state transfer / Email / Computing / Internet / Data

SiteUptime.com REST API version[removed] Table of contents

Add to Reading List

Source URL: siteuptime.com

Language: English - Date: 2014-08-21 01:28:08
532Information / Man-in-the-middle attack / Interlock protocol / Out-of-band / Communications protocol / Transport Layer Security / Authentication / Streaming media / Computing / Cryptographic protocols / Data

ABSTRACT Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE:

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-12-05 17:18:58
533Padding / Block cipher modes of operation / IPsec / Initialization vector / Block cipher / Stream cipher / Internet Key Exchange / Cryptanalysis / Message authentication code / Cryptography / Cryptographic protocols / Internet protocols

Side Channel Analyses of CBC Mode Encryption Arnold K. L. Yau Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-07-05 19:55:24
534Internet protocols / Two-factor authentication / Authentication / Password / Computer network security / Authenticator / CAVE-based authentication / IEEE 802.1X / Security / Computer security / Access control

10 - Challenge questions and secondary authentication Shing-hon Lau February 13th, [removed][removed] Usable Privacy and Security

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-02-13 18:25:38
535Block cipher modes of operation / Finite fields / Message authentication codes / Cryptographic Message Syntax / Key Management Interoperability Protocol / Key management / PKCS / Internet security / Galois/Counter Mode / Cryptography / Cryptographic protocols / Public-key cryptography

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-04-29 10:56:53
536Information technology management / Crime prevention / National security / Internet protocols / Internet standards / Authentication / Simple Network Management Protocol / Computer security / Cryptographic protocol / Security / Computing / Computer network security

Privilege Management Protocols

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:07:22
537Wireless networking / Cryptography / Technology / IEEE 802.11 / Wireless security / EAP-SIM / Extensible Authentication Protocol / Wi-Fi Protected Access / Wireless LAN / Cryptographic protocols / Computer network security / Computing

Report on DIMACS∗ Workshop on Mobile and Wireless Security Date of Workshop: November 3 - 4, 2004

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-05-10 10:32:50
538Data / Information / Videotelephony / IEEE 802.11 / Protected Extensible Authentication Protocol / Extensible Authentication Protocol / Cisco Systems / Cisco Unified Communications Manager / Network security / Computing / Computer network security / Cryptographic protocols

White Paper Cisco DX650 Cisco DX650 Security Overview The Cisco DX650 includes many security options:

Add to Reading List

Source URL: www.cisco.com

Language: English
539Code division multiple access / Cryptographic protocols / Mobile technology / AKA / Roaming / Universal Mobile Telecommunications System / IEEE 802.11 / Handover / Extensible Authentication Protocol / Technology / Wireless networking / Wireless

Key Management Challenges in Mobility Applications

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:08:30
540Merchant services / Cryptographic protocols / Radio-frequency identification / Verisign / Certificate authority / Authentication / Payment gateway / X.509 / Two-factor authentication / Cryptography / Public-key cryptography / Key management

Knowledge-Based Authentication Challenge Response System Kevin Trilli Director, Product Management VeriSign, Inc. Bill Andrews

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
UPDATE