Authentication protocols

Results: 771



#Item
581Computer network security / Internet standards / Key management / Secure messaging / Transport Layer Security / Public key infrastructure / Two-factor authentication / Security token / X.509 / Cryptography / Public-key cryptography / Cryptographic protocols

On Securing the Public Health Information Network Messaging System

Add to Reading List

Source URL: www.cdc.gov

Language: English - Date: 2011-05-20 09:08:01
582Electronic commerce / Cryptographic protocols / Secure communication / Public key infrastructure / Certificate authority / Public key certificate / X.509 / Entrust / Transport Layer Security / Cryptography / Public-key cryptography / Key management

IdenTrust™ Trust Network Certificates SSL and Bank-Branded Certificates Benefits Server and Network Level Authentication Ensures Privacy,

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:49:11
583Cryptographic protocols / X.509 / Web.config / Password / Subroutine / PKCS / Public-key cryptography / Computer programming / Computing

If you are a .net user experiencing authentication problems using strong authentication and receiving an error that reads something like this:   Message : WSE567: The incoming Username token must contain both a nonce a

Add to Reading List

Source URL: www.statemef.com

Language: English - Date: 2010-01-11 15:10:03
584Cryptographic protocols / Identity management / Electronic signature / Electronic authentication / Two-factor authentication / Authentication / Security token / Service-oriented architecture / Signature / Cryptography / Security / Notary

[removed]Federal Register / Vol. 78, No[removed]Wednesday, June 26, [removed]Proposed Rules The airspace within R– 4105 is excluded

Add to Reading List

Source URL: copyright.gov

Language: English - Date: 2013-06-26 08:56:06
585Computer security / OAuth / Access token / Internet standards / Authentication / Authorization / RADIUS / AAA protocol / Computing / Internet protocols / Security

Internet Engineering Task Force (IETF) Request for Comments: 6749 Obsoletes: 5849 Category: Standards Track ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2012-10-12 18:41:28
586Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-12-02 17:00:16
587Password authentication protocol / Password / Cloud computing / One-time password / HTTP / Cryptographic protocols / Password manager / Computing / Computer security / Security

European Parliament & Mobility AOUADI Fakhreddine Directorate-General for Innovation and Technological Support ICT in the European Parliament

Add to Reading List

Source URL: www.ictparliament.org

Language: English - Date: 2012-09-14 10:44:25
588Internet standards / Internet protocols / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Man-in-the-middle attack / Key management / Internet / Cryptography / Computing

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prev

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-07-28 17:01:12
589Computing / Computer-mediated communication / Spamming / Cryptographic protocols / DomainKeys Identified Mail / DomainKeys / MDaemon / Domain Assurance Council / Phishing / Email authentication / Spam filtering / Email

DKIM Interop Testing Event – For Immediate Release Internet Messaging Leaders Work Together to Fight Email Fraud Email Testing Event Strengthens Sender Accountability DALLAS, Texas and SUNNYVALE, California – Novemb

Add to Reading List

Source URL: www.dkim.org

Language: English - Date: 2008-07-25 21:50:27
590Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
UPDATE