Authentication protocols

Results: 771



#Item
721Network protocols / Internet protocols / Cryptographic protocols / Wireless networking / IEEE 802.1X / Windows Rally / Extensible Authentication Protocol / Wireless security / Universal Plug and Play / Computing / Technology / Computer network security

Windows Connect Now–NET - 2 Windows Connect Now–NET - 2

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-12-11 17:10:47
722Home automation / Telecommunications engineering / Internet protocols / Z-Wave / Cryptographic protocols / ZigBee / Password authentication protocol / Transmission Control Protocol / Bluetooth / Wireless networking / Technology / Computing

Security Evaluation of the Z-Wave Wireless Protocol

Add to Reading List

Source URL: research.sensepost.com

Language: English - Date: 2013-08-14 07:38:54
723Information / Cryptographic protocols / Computer network security / Internet protocols / Extensible Authentication Protocol / Password authentication protocol / RADIUS / Authentication protocol / Kerberos / Computing / Wireless networking / Data

Man-in-the-Middle in Tunneled Authentication Protocols N. Asokan, Valtteri Niemi, Kaisa Nyberg Nokia Research Center, Finland

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-11-13 05:00:33
724Cryptographic protocols / Data / Internet protocols / CRAM-MD5 / Digest access authentication / Simple Authentication and Security Layer / Lightweight Directory Access Protocol / Transport Layer Security / Password / Computing / Internet standards / Internet

SCRAM in LDAP Better Password-based Authentication Kurt Zeilenga

Add to Reading List

Source URL: people.apache.org

Language: English - Date: 2011-10-12 12:20:00
725Data / Wireless / Computer network security / IEEE 802.11 / Internet protocols / Extensible Authentication Protocol / IEEE 802.1X / Xsupplicant / EAP-SIM / Cryptographic protocols / Wireless networking / Computing

50055_80211_Protocol_4_1_rc.ai

Add to Reading List

Source URL: www.oreillynet.com

Language: English - Date: 2005-05-16 19:45:39
726Security / Computer network security / Internet protocols / Wireless networking / IEEE 802.11i-2004 / IEEE 802.1X / Extensible Authentication Protocol / Wireless security / Supplicant / Computing / Cryptography / Cryptographic protocols

802.11i Authentication and Key Management (AKM) White Paper

Add to Reading List

Source URL: www.cwnp.com

Language: English - Date: 2013-09-16 20:04:37
727Universal Mobile Telecommunications System / Generic Authentication Architecture / Standards organizations / Bootstrapping Server Function / Generic Bootstrapping Architecture / Videotelephony / 3GPP / European Telecommunications Standards Institute / Telecoms & Internet converged Services & Protocols for Advanced Networks / Technology / Mobile technology / Electronic engineering

ETSI TR[removed]V6[removed]Technical Report

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2005-04-14 02:35:50
728Cryptography / Technology / Cryptographic protocols / IEEE 802.11 / Extensible Authentication Protocol / Wired Equivalent Privacy / Password authentication protocol / Wireless access point / Integrated Windows Authentication / Wireless networking / Computer network security / Computing

Your[removed]Wireless Network has No Clothes∗ William A. Arbaugh Narendar Shankar

Add to Reading List

Source URL: WWW.cs.umd.edu

Language: English - Date: 2001-08-11 18:26:34
729Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Key management / Perfect forward secrecy / Password authentication protocol / Man-in-the-middle attack / YAK / SILC / Cryptography / Cryptographic protocols / MQV

Overview of Key Agreement Protocols Ratna Dutta and Rana Barua Stat-Math Unit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-10-04 07:51:24
730Off-the-Record Messaging / Man-in-the-middle attack / Diffie–Hellman key exchange / Public-key cryptography / Public key fingerprint / Alice and Bob / Blinding / RSA / Extensible Messaging and Presence Protocol / Cryptography / Cryptographic protocols / Socialist millionaire

Improved User Authentication in Off-The-Record Messaging Chris Alexander

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2007-08-16 13:09:03
UPDATE