![Computing / Kerberos / Integrated Windows Authentication / Single sign-on / Authentication server / Secure Shell / Authentication / AKA / Proxy server / Cryptography / Computer network security / Computer security Computing / Kerberos / Integrated Windows Authentication / Single sign-on / Authentication server / Secure Shell / Authentication / AKA / Proxy server / Cryptography / Computer network security / Computer security](https://www.pdfsearch.io/img/25e72049f0233b3463243cb57e32be5b.jpg)
| Document Date: 2002-06-12 12:33:53 Open Document File Size: 635,23 KBShare Result on Facebook
Company Single Signon Systems / / / Event FDA Phase / / Facility University of Michigan / University of Michigan June / / IndustryTerm distributed authentication protocol / symmetric key authentication protocol / asymmetric authentication protocol / authentication protocol / interoperability tools / secure systems / authentication systems / symmetric key infrastructure / public key base authentication services / secure file systems / Web certificates / public key infrastructure / Web server serves / given authentication protocol / proxy server / trusted server / client-server authentication protocol / unreliable networks / Web browser / distributed authentication protocols / Web Server / secure hardware / secure email protocols / parallel processing resources / symmetric authentication protocol / public key authentication protocol / Web access / encryption algorithm / legacy applications / authentication protocols / real-time involvement / / OperatingSystem UNIX / / Organization K. Trusted Third Party / Key Management Service / the University of Michigan / / Person Paul Resnick Carl Ellison / Brian Noble Atul Prakash Paul / Robert Heinlein / Peter Honeyman / / Position Advisor / Private / / Product symmetric / / ProvinceOrState Michigan / / Technology Encryption / Symmetric key encryption / S/MIME / client-server authentication protocol / given authentication protocol / authentication protocol / cryptography / Public Key Infrastructure / public key / proxy server / authentication protocols / peer-to-peer / encryption algorithm / public key authentication protocol / PKI / VPN / symmetric key authentication protocol / K. Asymmetric key encryption / secure email protocols / symmetric authentication protocol / smart card / private key / distributed authentication protocols / SSL / same distributed authentication protocol / parallel processing / Web Server / asymmetric authentication protocol / public key encryption / /
SocialTag |