Authentication protocols

Results: 771



#Item
591Merchant services / Business / Secure communication / 3-D Secure / Payment systems / Authentication / Acquiring bank / Public key certificate / Transport Layer Security / Cryptography / Cryptographic protocols / Electronic commerce

J/Secureā„¢ Protocol Specification Ver.1.0 January 2008 2008 JCB Co., Ltd. All rights reserved.

Add to Reading List

Source URL: partner.jcbcard.com

Language: English - Date: 2011-07-08 04:06:09
592Eduroam / Computer network security / Internet standards / Wireless networking / IEEE 802.1X / RADIUS / Extensible Authentication Protocol / Internet Authentication Service / SURFnet / Computing / Internet protocols / Computer security

Microsoft Word - GN2-06-258v8 DJ5.1.5 Inter-NREN Roaming Infrastructure and Service Support _Cookbook, 1st version_.doc

Add to Reading List

Source URL: www.niif.hu

Language: English - Date: 2008-02-05 04:54:26
593Eduroam / Internet protocols / IEEE 802.1X / RADIUS / Wireless networking / Extensible Authentication Protocol / AAA protocol / University Computing Centre / TERENA / Computing / Computer network security / Computer security

Microsoft Word - GN2-07-327v2 Deliverable DS5_1_1- eduroam Service Definition.doc

Add to Reading List

Source URL: www.niif.hu

Language: English - Date: 2008-02-05 04:54:26
594Computing / System software / Internet protocols / Intelligent Platform Management Interface / Password / RADIUS / Two-factor authentication / HP Integrated Lights-Out / Verax IPMI java library / System administration / Information technology management / Out-of-band management

dan farmer/ [removed]/June-23rd-2014/v[removed]Sold Down the River Summary A world-wide scan of the Intelligent Platform Management Interface (IPMI) protocol identified over 230,000 Baseboard Management Controllers (

Add to Reading List

Source URL: www.fish2.com

Language: English - Date: 2014-06-23 10:34:54
595Computer security / IEEE 802.1X / Cyberwarfare / Protected Extensible Authentication Protocol / Password / Wi-Fi / Cryptographic protocols / Wireless security / Extensible Authentication Protocol / Computer network security / Computing / Wireless networking

PDF Document

Add to Reading List

Source URL: www.gov.hk

Language: English - Date: 2010-02-07 08:35:43
596HTTP / Key management / WS-Security / Password / Authentication / HTTP Secure / X.509 / Public key certificate / SAP Logon Ticket / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.dgaiec.min-financas.pt

Language: English - Date: 2014-08-18 22:25:37
597OSI protocols / Hypertext Transfer Protocol / HTTP cookie / Basic access authentication / MIME / Communications protocol / HTTP / Computing / Data

PDF Document

Add to Reading List

Source URL: hc.apache.org

Language: English - Date: 2014-06-30 13:46:03
598Cloud infrastructure / Computer network security / Cryptographic protocols / Apache Hadoop / Cloud computing / Kerberos / Authentication / SPNEGO / Security token / Computing / Computer security / Security

PDF Document

Add to Reading List

Source URL: hadoop.apache.org

Language: English - Date: 2013-08-04 04:13:21
599Data / Cryptographic protocols / HTTP / Internet protocols / Secure communication / Kerberos / NTLM / Integrated Windows Authentication / Transport Layer Security / Computing / Computer network security / Internet

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-01-09 21:15:16
600Computer security / Internet standards / Internet protocols / Directory services / Cryptographic protocols / Kerberos / Integrated Windows Authentication / Server Message Block / SPNEGO / Computing / Microsoft Windows / Computer network security

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-07-23 18:27:02
UPDATE