Authentication protocols

Results: 771



#Item
561Software / System administration / Remote administration software / Internet protocols / Internet standards / Simple Network Management Protocol / Remote administration / Password / Two-factor authentication / Computing / System software / Computer network security

Kaseya Product Brief The Kaseya Unified Management Platform A System You Can Trust Kaseya was designed and built with security as the fundamental building block to its core architecture. In fact, the name itself, Kaseya,

Add to Reading List

Source URL: www.kaseya.com

Language: English - Date: 2013-07-11 22:53:32
562Computing / Cryptographic hash functions / Information / Internet protocols / Internet standards / Hash tree / Hash list / Hash function / Transport Layer Security / Hashing / Error detection and correction / Cryptography

Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen IBM Almaden Research Center

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-04-05 14:58:32
563Computer network security / MQV / Diffie–Hellman key exchange / Authentication / AKA / Cryptography / Cryptographic protocols / Public-key cryptography

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 186–200. A New Key Exchang

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
564Cryptographic protocols / HTTP / Two-factor authentication / Password / Security token / Keystroke logging / Authentication / HTTP Secure / Transaction authentication number / Security / Cryptography / Computer security

YubiKey Security Evaluation Discussion of security properties and best practices Version: 2.0.1

Add to Reading List

Source URL: static.yubico.com

Language: English - Date: 2012-07-23 09:30:50
565Authentication / Notary / Packaging / Code division multiple access / Cryptographic protocols / Security / Cryptography / Access control

Workshop: Who are you?! Adventures in Authentication       Symposium on Usable Privacy and Security (SOUPS)     July 9, 2014     Menlo Park, CA     https://cups.cs.cmu.edu/soups/2014/workshops

Add to Reading List

Source URL: www.issnet.ca

Language: English - Date: 2014-05-06 17:06:52
566Cryptography standards / Cryptographic protocols / Computer network security / NSA Suite B Cryptography / Extensible Authentication Protocol / Aruba Networks / IEEE 802.1X / NSA Suite A Cryptography / Cryptographic Modernization Program / Cryptography / National Security Agency / Computing

Advanced Cryptography Module Data Sheet ARUBAOS ADVANCED CRYPTOGRAPHY MODULE

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2011-07-26 11:17:10
567Tickets / Computing / Password / Project Athena / Information / Data / Internet protocols / Computer network security / Kerberos

Designing an Authentication System: a Dialogue in Four Scenes Bill Bryant Project Athena Massachusetts Institute of Technology Cambridge, MA 02139

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-09-04 11:43:39
568Cryptographic protocols / Distance-bounding protocol / Complexity classes / Challenge-response authentication / IP / Transmission time / NP / Transmission Control Protocol / Network packet / Theoretical computer science / Information / Data

83 So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore Computer Laboratory, University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-10-27 15:37:45
569One-time password / Internet protocols / HOTP / Universal Serial Bus / Two-factor authentication / Non-volatile memory / USB human interface device class / USB flash drive / Computer hardware / Computing / Security

yubico cococo The YubiKey Manual Usage, configuration and introduction of basic concepts

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2013-07-03 10:48:24
570Internet standards / Directory services / Software / One-time password / RADIUS / Two-factor authentication / Transport Layer Security / Password / Lightweight Directory Access Protocol / Computing / Internet protocols / Security

YubiRADIUS Virtual Appliance YubiRADIUS Validation Protocol Software Version: 3.5.1 Document Version: 1.1 April 20, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:36
UPDATE