Authentication protocols

Results: 771



#Item
711Cryptography / Secure communication / Internet standards / Internet protocols / HTTP / Transport Layer Security / HTTP Secure / Challenge-response authentication / Public-key cryptography / Computing / Internet / Cryptographic protocols

Programming Assignment 3 Winter 2014 CS 255: Intro to Cryptography Prof. Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-03-01 03:17:18
712Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP)

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
713Computer network security / Key management / Kerberos / Generic Security Services Application Program Interface / Single sign-on / Ticket Granting Ticket / Key distribution center / Cryptographic protocols / Generic Security Service Algorithm for Secret Key Transaction / Computer security / Computing / Cryptography

Simplify enterprise Java authentication with single sign-on Design secure client/server Java applications that use GSS-API and

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2013-09-18 06:43:11
714Computer security / Security / Identity management / Internet protocols / Internet standards / Password / Transaction authentication number / Access control

MYCIDS User Access Request Form

Add to Reading List

Source URL: courts.ms.gov

Language: English - Date: 2012-05-04 13:24:52
715Information technology management / Network management / Simple Network Management Protocol / System administration / Internet / Authentication / Everything2 / Computing / Internet protocols / Internet standards

Hands-On SNMPv3 Tutorial & Demo Manual Copyrights NuDesign Technologies, Inc.

Add to Reading List

Source URL: www.ndt-inc.com

Language: English - Date: 2012-01-30 16:28:11
716One-time password / Internet protocols / HOTP / USB / Two-factor authentication / Universal Serial Bus / Non-volatile memory / USB human interface device class / USB flash drive / Computer security / Computing / Security

The YubiKey Manual Usage, configuration and introduction of basic concepts

Add to Reading List

Source URL: static.yubico.com

Language: English - Date: 2010-11-30 14:15:50
717Cryptographic protocols / System software / Digest access authentication / Request for Comments / Password / Basic access authentication / Pluggable authentication module / HTTP Secure / HTTP / Computing / Software

OpenWBEM Getting Started Guide Author: Dan Nuffer Last update: [removed]

Add to Reading List

Source URL: openwbem.sourceforge.net

Language: English - Date: 2004-12-09 17:23:35
718Computer security / Cyberwarfare / OpenVPN / Virtual private network / Two-factor authentication / Point-to-Point Tunneling Protocol / One-time password / Password / DrayTek / Computer network security / Tunneling protocols / Computing

Microsoft Word - 如何使用mOTP應用於SmartVPN Client撥打 VPN Tunnel_英文版_.doc

Add to Reading List

Source URL: www.draytek.co.za

Language: English - Date: 2010-07-02 05:25:28
719Internet standards / Internet protocols / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Man-in-the-middle attack / Key management / Internet / Cryptography / Computing

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prev

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-07-28 17:01:12
720Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-12-02 17:00:16
UPDATE