language:
Find link is a tool written by Edward Betts.Longer titles found: Extensible Authentication Protocol (view), Challenge-Handshake Authentication Protocol (view), Password Authentication Protocol (view), Protected Extensible Authentication Protocol (view), Lightweight Extensible Authentication Protocol (view)
searching for Authentication protocol 36 found (755 total)
alternate case: authentication protocol
IndieAuth
(226 words)
[view diff]
exact match in snippet
view article
find links to article
IndieAuth is an open standard decentralized authentication protocol that uses OAuth 2.0 and enables services to verify the identity of a user representedFactotum (software) (210 words) [view diff] exact match in snippet view article
Factotum is a password management and authentication protocol negotiation virtual file system for Plan 9 from Bell Labs. When a program wants to authenticateSecure Shell (4,510 words) [view diff] exact match in snippet view article find links to article
server authentication, confidentiality, and integrity; the user authentication protocol validates the user to the server; and the connection protocol multiplexesPoint-to-Point Protocol daemon (514 words) [view diff] exact match in snippet view article find links to article
Using protocols like Challenge-handshake authentication protocol (CHAP) or Password authentication protocol (PAP) it has to provide and check authenticationKey selection vector (963 words) [view diff] exact match in snippet view article find links to article
with them for authenticating protected content. The restricted authentication protocol uses asymmetric key management and common key cryptography, andNeuman–Stubblebine protocol (649 words) [view diff] exact match in snippet view article find links to article
The Neuman–Stubblebine protocol is a computer network authentication protocol designed for use on insecure networks (e.g., the Internet). It allows individualsAuthenticator (3,661 words) [view diff] exact match in snippet view article find links to article
or more authenticators to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity. AuthenticatorsClient to Authenticator Protocol (355 words) [view diff] exact match in snippet view article find links to article
Authentication protocolWide Mouth Frog protocol (427 words) [view diff] exact match in snippet view article find links to article
The Wide-Mouth Frog protocol is a computer network authentication protocol designed for use on insecure networks (the Internet for example). It allowsVQP (318 words) [view diff] exact match in snippet view article find links to article
have turned to support dynamic VLAN assignments using the 802.1X authentication protocol with a Radius server that has additional attributes designatingPass the hash (1,783 words) [view diff] exact match in snippet view article find links to article
the hash. The attack exploits an implementation weakness in the authentication protocol, where password hashes remain static from session to session untilMARID (580 words) [view diff] case mismatch in snippet view article find links to article
an acronym of MTA Authorization Records In DNS. Lightweight MTA Authentication Protocol (LMAP) was a generic name for a set of 'designated sender' proposalsSupplemental access control (538 words) [view diff] exact match in snippet view article find links to article
"Supplemental Access Control" Technical Report introduces the Chip Authentication protocol as an alternative to Active Authentication and integrates it withDMARC (3,719 words) [view diff] exact match in snippet view article find links to article
Authentication, Reporting and Conformance (DMARC) is an email authentication protocol. It is designed to give email domain owners the ability to protectDeniable authentication (327 words) [view diff] exact match in snippet view article find links to article
Chia-Chun Wu; Woei-Jiunn Tsaur (17 April 2006). "A novel deniable authentication protocol using generalized ElGamal signature scheme" (PDF). InformationDigital signature transponder (1,059 words) [view diff] exact match in snippet view article find links to article
uses a proprietary block cipher to implement a challenge–response authentication protocol. Each DST tag contains a quantity of non-volatile RAM, which storesWebID (638 words) [view diff] exact match in snippet view article find links to article
protocol (formerly known as FOAF+SSL) is a decentralized and secure authentication protocol built upon the profile information as well as the Transport LayerProprietary protocol (472 words) [view diff] exact match in snippet view article find links to article
Microsoft developed a proprietary extension to the Kerberos network authentication protocol for the Windows 2000 operating system. The extensions made theSILC (protocol) (912 words) [view diff] exact match in snippet view article
divided in three main parts: SILC Key Exchange (SKE) protocol, SILC Authentication protocol and SILC Packet protocol. SILC protocol additionally defines SILCSOCKS (2,315 words) [view diff] case mismatch in snippet view article find links to article
0x03–0x7F: methods assigned by IANA 0x03: Challenge–Handshake Authentication Protocol 0x04: Unassigned 0x05: Challenge–Response Authentication MethodElectronic authentication (4,218 words) [view diff] exact match in snippet view article find links to article
his or her identity to a verifier by the use of a token and an authentication protocol. This is called Proof of Possession (PoP). Many PoP protocols areXerox Network Systems (3,093 words) [view diff] case mismatch in snippet view article find links to article
that IP easily displaced it. The XNS protocols also included an Authentication Protocol and an Authentication Service to support it. Its "Strong credentials"Key distribution center (317 words) [view diff] case mismatch in snippet view article find links to article
(Authentication Server) and the TGS (Ticket Granting Service).) Kerberos Authentication Protocol Archived 2012-03-17 at the Wayback Machine Microsoft: KerberosList of information technology initialisms (124 words) [view diff] case mismatch in snippet view article find links to article
replaced by ITU-T Organization ITU-T CHAP Challenge-Handshake Authentication Protocol (PPP) Security, telecom RFC 1994 CIDR Classless Inter-Domain RoutingNTLMSSP (99 words) [view diff] case mismatch in snippet view article find links to article
Microsoft's Open Protocol Specification. MS-NLMP - NT LAN MANAGER (NTLM) Authentication Protocol Specification Archived 2008-04-11 at the Wayback Machine v t eAlberta Netcare (300 words) [view diff] exact match in snippet view article find links to article
and received over a HTTPS connection. Netcare uses a two-factor authentication protocol involving a username/password combination, and an RSA SecurID KeyFriend of a friend (1,102 words) [view diff] exact match in snippet view article find links to article
WebID for identifying correspondents, and to designate a secure authentication protocol. Look up FOAF in Wiktionary, the free dictionary. Composition ofIntegrated Windows Authentication (892 words) [view diff] exact match in snippet view article find links to article
Integrated Windows Authentication itself is not a standard or an authentication protocol. When IWA is selected as an option of a program (e.g. within theJerry Saltzer (890 words) [view diff] exact match in snippet view article find links to article
became the basis for a company called FTP Software Kerberos, an authentication protocol, part of Project Athena, still widely used today As Technical DirectorCertified Server Validation (436 words) [view diff] case mismatch in snippet view article find links to article
the ASRG, as defined in detail as the intent of Lightweight MTA Authentication Protocol (LMAP) in an expired ASRG draft. As of January 3, 2007, all InternetKey authentication (584 words) [view diff] case mismatch in snippet view article find links to article
Networks. Pearson. ISBN 978-0132126953. Honest Achmed asks for trust Kerberos: The Network Authentication Protocol Kerberos Authentication explainedSecurity Protocols Open Repository (174 words) [view diff] case mismatch in snippet view article find links to article
long lists of cryptographers. Symmetric-key algorithm A Survey of Authentication Protocol Literature: Version 1.0 Archived 2007-02-24 at the Wayback MachineSimple Protocol for Independent Computing Environments (841 words) [view diff] exact match in snippet view article find links to article
ticket. The current SPICE protocol also allows for use of the SASL authentication protocol, thus enabling support for a wide range of admin configurable authenticationGavin Lowe (computer scientist) (577 words) [view diff] exact match in snippet view article
(November 1995). "An attack on the Needham-Schroeder public key authentication protocol". Information Processing Letters. 56 (3): 131–136. CiteSeerX 10Hugo Krawczyk (610 words) [view diff] exact match in snippet view article find links to article
WhatsApp, Facebook Messenger, and others; and OPAQUE, a password authentication protocol being standardized by the IRTF and recently deployed by FacebookSPKAC (624 words) [view diff] exact match in snippet view article find links to article
Retrieved 17 October 2016. "WebID: creating a global decentralised authentication protocol". W3C. Retrieved 13 October 2013. Nevile, Chaals (3 June 2016)