<--- Back to Details
First PageDocument Content
Internet protocols / Network protocols / Tunneling protocols / Computer network security / Point-to-Point Tunneling Protocol / Internet standards / LM hash / Microsoft Point-to-Point Encryption / Password authentication protocol / Computing / Data / Network architecture
Date: 2014-03-02 23:18:30
Internet protocols
Network protocols
Tunneling protocols
Computer network security
Point-to-Point Tunneling Protocol
Internet standards
LM hash
Microsoft Point-to-Point Encryption
Password authentication protocol
Computing
Data
Network architecture

Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP) Bruce Schneier Counterpane Systems, 101 East Minnehaha Parkway,

Document is deleted from original location.
Use the Download Button below to download from the Web Archive.

Download Document from Web Archive

File Size: 152,57 KB