Authentication protocols

Results: 771



#Item
741Internet / Data / Secure communication / Internet standards / Internet protocols / Digest access authentication / Transport Layer Security / Basic access authentication / HTTP Secure / HTTP / Cryptographic protocols / Computing

HTTP Digest Integrity Another look, in light of recent attacks

Add to Reading List

Source URL: www.vsecurity.com

Language: English - Date: 2013-08-14 23:43:46
742Routing / Internet standards / Internet protocols / Border Gateway Protocol / IP hijacking / Classless Inter-Domain Routing / IP address / IPv6 / Autonomous system / Network architecture / Internet / Computing

Origin Authentication in Interdomain Routing William Aiello

Add to Reading List

Source URL: www.patrickmcdaniel.org

Language: English - Date: 2013-08-29 10:14:07
743Computer network security / IEEE 802.11 / Computing / Technology / Wi-Fi / Wi-Fi Protected Access / IEEE 802.11i-2004 / Extensible Authentication Protocol / Temporal Key Integrity Protocol / Cryptographic protocols / Wireless networking / Cryptography

Q&A WPA2™

Add to Reading List

Source URL: www.wi-fi.org

Language: English - Date: 2010-06-05 11:49:43
744Wireless / Telecommunications engineering / Automatic identification and data capture / Privacy / Radio-frequency identification / Challenge-response authentication / Distance-bounding protocol / Man-in-the-middle attack / Communications protocol / Information / Data / Cryptographic protocols

Preparation of Papers for the First EURASIP Workshop on RFID Technology

Add to Reading List

Source URL: www.eurasip.org

Language: English - Date: 2009-04-03 09:44:44
745Email / Computer security / Computing / Cryptographic protocols / DMARC / DomainKeys Identified Mail / Phishing / Anti-spam techniques / Sender Policy Framework / Email authentication / Spam filtering / Spamming

DMARC Providing domain owners control of their brand in the email channel

Add to Reading List

Source URL: www.dmarc.org

Language: English - Date: 2012-01-30 11:40:36
746Cryptographic protocols / HTTP / Password / Challenge-response authentication / Two-factor authentication / Security token / Digest access authentication / Cryptographic nonce / Authentication / Security / Cryptography / Computer security

CHAPTER 3

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:54
747Cryptography / MS-CHAP / Point-to-Point Tunneling Protocol / Password / Challenge-response authentication / Authentication protocol / Crypt / LM hash / NTLM / Computing / Computer security / Internet protocols

Exploiting known security holes in Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Jochen Eisinger

Add to Reading List

Source URL: penguin-breeder.org

Language: English - Date: 2003-02-21 09:40:07
748Data / Information / Communications protocol / Challenge-response authentication / Cryptography / Physical Unclonable Function / Randomness

2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:34
749Computing / Information / Cost estimation in software engineering / EMI / Communications protocol / Usability / UUCP / Application programming interface / Two-factor authentication / Network protocols / Technical communication / Technology

Project Estimation With Use Case Points Roy K. Clemmons

Add to Reading List

Source URL: www.bfpug.com.br

Language: English - Date: 2013-09-01 13:50:00
750Security / Password / Challenge-response authentication / Digest access authentication / Secure Remote Password protocol / Man-in-the-middle attack / Zero-knowledge proof / OTPW / Security token / Cryptography / Cryptographic protocols / Computer security

PDF Document

Add to Reading List

Source URL: drmlab.org

Language: English - Date: 2008-12-04 05:05:52
UPDATE