language:
Find link is a tool written by Edward Betts.searching for Mutual authentication 40 found (71 total)
alternate case: mutual authentication
IMSI-catcher
(2,137 words)
[view diff]
exact match in snippet
view article
find links to article
attack. The 3G wireless standard offers some risk mitigation due to mutual authentication required from both the handset and the network. However, sophisticatedExtensible Authentication Protocol (4,172 words) [view diff] exact match in snippet view article find links to article
World Wide Web, the majority of implementations of EAP-TLS require mutual authentication using client-side X.509 certificates without giving the option toX.1035 (230 words) [view diff] exact match in snippet view article find links to article
specifies a password-authenticated key agreement protocol that ensures mutual authentication of two parties by using a Diffie–Hellman key exchange to establishSecure telephone (760 words) [view diff] exact match in snippet view article find links to article
end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man-in-the-middleTLS-SRP (339 words) [view diff] exact match in snippet view article find links to article
certificates or mismatched common name fields. TLS-SRP provides mutual authentication (the client and server both authenticate each other), while TLSBootstrapping Server Function (350 words) [view diff] exact match in snippet view article find links to article
Cellular networks which provides application-independent functions for mutual authentication of user equipment and servers unknown to each other and for 'bootstrapping'Closed-loop authentication (474 words) [view diff] exact match in snippet view article find links to article
that identity. It is also sometimes used to refer to a system of mutual authentication whereby two parties authenticate one another by signing and passingNeedham–Schroeder protocol (2,192 words) [view diff] exact match in snippet view article find links to article
on public-key cryptography. This protocol is intended to provide mutual authentication between two parties communicating on a network, but in its proposedSecure access module (438 words) [view diff] case mismatch in snippet view article find links to article
and digital signing to ensure data confidentiality and integrity. Mutual Authentication: Facilitating a two-way authentication process between the smartStrongSwan (767 words) [view diff] exact match in snippet view article find links to article
of RFC 5998 EAP-Only Authentication in conjunction with strong mutual authentication methods like e.g. EAP-TLS. Support of RFC 4739 IKEv2 Multiple AuthenticationMS-CHAP (586 words) [view diff] exact match in snippet view article find links to article
returned in the Failure packet message field. MS-CHAPv2 provides mutual authentication between peers by piggybacking a peer challenge on the response packetNetwork Security Services (1,230 words) [view diff] exact match in snippet view article find links to article
implementations. SSL 3.0. The Secure Sockets Layer (SSL) protocol allows mutual authentication between a client and server and the establishment of an authenticatedFeliCa (1,475 words) [view diff] exact match in snippet view article find links to article
States. FeliCa's encryption key is dynamically generated each time mutual authentication is performed, preventing fraud such as impersonation. FeliCa isRSA SecurID (2,341 words) [view diff] no match in snippet view article find links to article
the user must carry. Token codes are easily stolen, because no mutual-authentication exists (anything that can steal a password can also steal a tokenStation-to-Station protocol (1,213 words) [view diff] exact match in snippet view article find links to article
Techniques", (1999). A simplified form of STS is available that provides mutual authentication but does not produce a shared secret. It uses random number challengesSOAP (2,571 words) [view diff] exact match in snippet view article find links to article
encrypted transport protocol underneath) with either simple or mutual authentication; this is the advocated WS-I method to provide web service securityEdDSA (2,117 words) [view diff] exact match in snippet view article find links to article
signature scheme. Apple Watch and iPhone use Ed25519 keys for IKEv2 mutual authentication Botan Crypto++ CryptoNote cryptocurrency protocol Dropbear SSH I2PdIBM API Management (1,987 words) [view diff] case mismatch in snippet view article find links to article
clustered for high availability. SSL Mutual Authentication for front-side connectivity SSL Mutual Authentication can be used to secure the connectionBootstrapping (3,490 words) [view diff] exact match in snippet view article find links to article
cellular networks which provides application independent functions for mutual authentication of user equipment and servers unknown to each other and for 'bootstrapping'UMTS security (506 words) [view diff] exact match in snippet view article find links to article
shortcomings of GSM security need to be addressed in UMTS. UMTS provides mutual authentication between the UMTS subscriber, represented by a smart card applicationInformation assurance (2,472 words) [view diff] case mismatch in snippet view article find links to article
Liu, Ching-Cheng; Deng, Yong-Yuan (2020-05-08). "A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing". WirelessApache Hive (2,300 words) [view diff] exact match in snippet view article find links to article
authorization support to provide security. Kerberos allows for mutual authentication between client and server. In this system, the client's requestIntel AMT versions (1,070 words) [view diff] case mismatch in snippet view article find links to article
Yes Power Policies No Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Mutual Authentication No Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Kerberos No Yes YesCTERA Networks (1,147 words) [view diff] exact match in snippet view article find links to article
CTERA and DISA (Defense Information Systems Agency) co-developed a mutual authentication technology using government-issued smart cards for additional layersDirect End to End Secure Chat Protocol (610 words) [view diff] exact match in snippet view article find links to article
protocol allows two SixChat User Agents to connect directly, perform mutual authentication with X.509 client digital certificates and then securely exchangeSecurity Assertion Markup Language (3,230 words) [view diff] no match in snippet view article find links to article
message-level security Requirements are often phrased in terms of (mutual) authentication, integrity, and confidentiality, leaving the choice of securitySecurity Assertion Markup Language (3,230 words) [view diff] no match in snippet view article find links to article
message-level security Requirements are often phrased in terms of (mutual) authentication, integrity, and confidentiality, leaving the choice of securityOtway–Rees protocol (798 words) [view diff] exact match in snippet view article find links to article
protocol Otway, Dave; Rees, Owen (1987-01-01). "Efficient and timely mutual authentication". ACM SIGOPS Operating Systems Review. 21 (1): 8–10. doi:10.1145/24592Wireless security (6,903 words) [view diff] exact match in snippet view article find links to article
authentication methods. EAP-TLS offers very good protection because of its mutual authentication. Both the client and the network are authenticated using certificatesWi-Fi Protected Access (4,663 words) [view diff] exact match in snippet view article find links to article
Marsh Ray). Moxie advised: "Enterprises who are depending on the mutual authentication properties of MS-CHAPv2 for connection to their WPA2 Radius serversMPEG-4 (3,044 words) [view diff] exact match in snippet view article find links to article
carriage of IPMP tools in the bit stream, IPMP information carriage, mutual authentication for IPMP tools, a list of registration authorities required forCloud printing (1,756 words) [view diff] exact match in snippet view article find links to article
non-self-generated cryptographic token or certificate allowing TLS mutual authentication and specific data encryption. Self-generated printer certificatesSIM card (6,920 words) [view diff] exact match in snippet view article find links to article
The USIM brought, among other things, security improvements like mutual authentication and longer encryption keys, and an improved address book. "SIM cards"Noise Protocol Framework (6,916 words) [view diff] exact match in snippet view article find links to article
and customized to meet specific security requirements, such as mutual authentication, forward secrecy, and identity protection, producing protocols withE-commerce identification and identification types (1,974 words) [view diff] case mismatch in snippet view article find links to article
Glasses can be worn during an iris scan, unlike a retinal scan. Mutual Authentication - is the process by which each party in an electronic communicationPoint-to-Point Protocol over Ethernet (5,509 words) [view diff] exact match in snippet view article find links to article
IPoE." The 10G-PON (XG-PON) standard (G.987) provides for 802.1X mutual authentication of the ONU and OLT, besides the OMCI method carried forward fromIMS security (2,601 words) [view diff] exact match in snippet view article find links to article
integrity keys (HMAC-MD5 or HMAC-SHA-1). ISIM ↔ HSS: Required for the mutual authentication. Both the HSS and the ISIM have stored a secret key and privateMIFARE (6,975 words) [view diff] exact match in snippet view article find links to article
does not prevent the attacks mentioned above but enables a secure mutual authentication between the reader and the card to prove that the card belongs toSIP extensions for the IP Multimedia Subsystem (6,787 words) [view diff] exact match in snippet view article find links to article
and among network nodes is a major issue to be addressed by using mutual authentication mechanisms such as private and public keys and digests, as wellOutline of computer security (5,240 words) [view diff] exact match in snippet view article find links to article
communication session. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of