Authentication protocols

Results: 771



#Item
701Computer architecture / Ubuntu / Protected Extensible Authentication Protocol / IEEE 802.11 / Technology / GlobalSign / Cryptographic protocols / Wi-Fi Protected Access / Wireless security / Wireless networking / Computer network security / Computing

Connecting to the Rovernet WPA2 Secured Wireless Network with with Ubuntu[removed]Intreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-06-22 11:40:33
702Cryptographic protocols / Computer security / Cyberwarfare / Windows XP / Wi-Fi / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / IEEE 802.1X / IEEE 802.11 / Computer network security / Computing / Wireless networking

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows XP Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to con

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-06-22 11:49:47
703Key management / Internet protocols / Internet standards / X.509 / Certificate authority / Public key certificate / HTTP Secure / OCSP stapling / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

When HTTPS Meets CDN: A Case of Authentication in Delegated Service Jinjin Liang∗, Jian Jiang∗, Haixin Duan∗, Kang Li§ , Tao Wan ¶ , Jianping Wu∗ ∗ Tsinghua University, § University of Georgia, ¶ Huawei Ca

Add to Reading List

Source URL: netsec.ccert.edu.cn

Language: English - Date: 2014-05-12 03:37:08
704Electronic commerce / Cryptographic protocols / Certificate authority / Public key infrastructure / X.509 / Public key certificate / Authentication / Transport Layer Security / Entrust / Cryptography / Public-key cryptography / Key management

IdenTrust™ Trust Network Community Bank Program Benefits Delivering Trust With Encryption and Authentication

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-02-20 16:11:56
705Cryptographic protocols / Cryptographic primitive / Encryption / Symmetric-key algorithm / HMAC / Advanced Encryption Standard / Key / Block cipher modes of operation / Backup / Cryptography / Message authentication codes / Hashing

The Truth about Data Integrity 5 Questions to ask your Online Backup Provider Introduction Competition is fierce in the exploding online backup industry. With so many providers, whom can you trust with your customers’

Add to Reading List

Source URL: www.backdat.com

Language: English - Date: 2011-12-02 01:06:05
706Technology / Computing / Wi-Fi / Service set / Protected Extensible Authentication Protocol / IEEE 802.11 / Cryptographic protocols / Wireless security / Wi-Fi Protected Access / Wireless networking / Computer network security / Wireless

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to conn

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-09-09 12:30:51
707Information / Cryptographic software / Internet protocols / Free software / ProVerif / Computer network security / Authentication protocol / Cryptographic primitive / CryptoVerif / Cryptographic protocols / Cryptography / Data

ProVerif 1.88: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial Bruno Blanchet1 , Ben Smyth1 , and Vincent Cheval2 1

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2013-08-30 03:11:35
708Algebra / Group theory / Finite fields / Ropework / Cryptographic protocols / Braid group / Braid theory / XTR / Braid / Abstract algebra / Cryptography / Knot theory

ENTITY AUTHENTICATION SCHEMES USING BRAID WORD REDUCTION ´ SIBERT, PATRICK DEHORNOY, AND MARC GIRAULT HERVE Abstract. Artin’s braid groups currently provide a promising background for cryptographical applications, sin

Add to Reading List

Source URL: www.math.unicaen.fr

Language: English - Date: 2005-05-09 03:57:37
709Software / System software / Internet protocols / Lightweight Directory Access Protocol / Active Directory / RADIUS / Novell eDirectory / LDAP Data Interchange Format / OpenLDAP / Directory services / Computing / Internet standards

NetSpective Content Filter Authentication Guide Copyright © [removed]by TeleMate.Net Software, LLC. All rights reserved Although the author and publisher have made every effort to ensure that the information in this d

Add to Reading List

Source URL: www.telemate.net

Language: English - Date: 2013-08-27 15:37:18
710Wireless networking / Cryptographic protocols / Technology / Wireless / Extensible Authentication Protocol / Software testing / Hotspot / Wireless security / TeamF1 / Computer network security / Wi-Fi / Computing

Case Study Dedicated Offshore Test Lab for Testing & Validation of Wireless Products Our Client Benefits Delivered

Add to Reading List

Source URL: www.ideavate.com

Language: English - Date: 2008-11-11 11:32:39
UPDATE