Kerberos

Results: 405



#Item
51The Perils of Unauthenticated Encryption: Kerberos Version 4∗ Tom Yu Sam Hartman Kenneth Raeburn Massachusetts Institute of Technology

The Perils of Unauthenticated Encryption: Kerberos Version 4∗ Tom Yu Sam Hartman Kenneth Raeburn Massachusetts Institute of Technology

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2003-11-20 16:34:21
    52VOP_podklad_zdroj_bez_pruhu_pro_cd

    VOP_podklad_zdroj_bez_pruhu_pro_cd

    Add to Reading List

    Source URL: www.vop.cz

    Language: English - Date: 2015-03-03 06:27:33
    53Instructions:  Check the appropriate column to indicate the application’s security capabilities. Please provide any additional responses or detailed explanations of other compensating controls as comments. Please numbe

    Instructions: Check the appropriate column to indicate the application’s security capabilities. Please provide any additional responses or detailed explanations of other compensating controls as comments. Please numbe

    Add to Reading List

    Source URL: www.himss.org

    Language: English - Date: 2013-02-13 10:28:31
    54Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

    Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2012-01-13 10:28:23
    55Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

    Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2012-01-15 19:52:05
    56Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 2 Protocols

    Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2006-08-23 11:43:55
    57State of New Mexico Statewide Architectural Configuration Requirement Title: Authentication and Directory Services Standard S-STD001.002 Effective Date: October 18, 2005 1.

    State of New Mexico Statewide Architectural Configuration Requirement Title: Authentication and Directory Services Standard S-STD001.002 Effective Date: October 18, 2005 1.

    Add to Reading List

    Source URL: www.doit.state.nm.us

    Language: English - Date: 2013-09-24 10:13:21
    58Contents  Preface to the Second Edition xxv

    Contents Preface to the Second Edition xxv

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2011-12-05 05:58:34
    59Du kannst mehr als nur  Scharren & Streicheln? Samba ist für Dich kein Tanz und Kerberos kein Höllenhund?

    Du kannst mehr als nur Scharren & Streicheln? Samba ist für Dich kein Tanz und Kerberos kein Höllenhund?

    Add to Reading List

    Source URL: www.physics.tu-berlin.de

    - Date: 2012-07-04 11:28:39
      60This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

      This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2011-07-10 02:35:13