Search results

Jump to navigation Jump to search
Results 1 – 21 of 556
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...tion (e.g. [[Internet Information Services|IIS]] with [[Integrated Windows Authentication|IWA]] turned on) and [[MSRPC]] services. ...-nlmp/b38c36ed-2804-4868-a9ff-8dd3182128e4 MS-NLMP - NT LAN MANAGER (NTLM) Authentication Protocol Specification] {{webarchive|url=https://web.archive.org/web/200804 ...
    1 KB (159 words) - 15:55, 26 November 2020
  • ...etwork access protocols and the [[Extensible Authentication Protocol|EAP]] authentication protocol. ...r (NAI) is the user identity submitted by the client during network access authentication. ...
    2 KB (212 words) - 01:49, 23 May 2023
  • ...EAP allows for clients to re-authenticate frequently; upon each successful authentication, the clients acquire a new WEP key (with the hope that the WEP keys don't l ...users to have stronger, more complicated [[passwords]] or move to another authentication protocol also developed by Cisco, [[EAP-FAST]], to ensure security.<ref>{{c ...
    3 KB (383 words) - 10:50, 18 March 2022
  • == Authentication == ...(see [[digital signatures]] for an explanation of how this works); secure authentication allows resources to lock data to only those who should have access to it. ...
    2 KB (274 words) - 00:58, 31 March 2023
  • ...rity Layer]], a framework for authentication and data security in Internet protocols ...
    720 bytes (91 words) - 13:36, 6 February 2018
  • ...d Authentication Protocol (PAP)|url=https://www.geeksforgeeks.org/password-authentication-protocol-pap/|access-date=2020-11-08|website=GeeksforGeeks|language=en-US}} ...ation Protocol|EAP]]. However, there are always tradeoffs when choosing an authentication method, and there is no single answer for which is more secure. ...
    4 KB (616 words) - 04:16, 28 March 2025
  • ...ort description|Framework for authentication and data security in Internet protocols}} ...example of mechanisms which can provide a data-security layer. Application protocols that support SASL typically also support [[Transport Layer Security]] (TLS) ...
    7 KB (907 words) - 23:11, 18 June 2025
  • ...he identities and contexts of the application entities, and could apply an authentication security check. [[Category:OSI protocols]] ...
    423 bytes (52 words) - 05:55, 26 March 2024
  • {{Short description|Authentication protocol to validate users}} ...ol]] (PPP) to validate users. CHAP is also carried in other authentication protocols such as [[RADIUS]] and [[Diameter (protocol)|Diameter]]. ...
    6 KB (877 words) - 07:44, 28 May 2024
  • ...so used for [[one-time password]] generation mechanism for [[digest access authentication]]. AKA is a [[challenge–response]] based mechanism that uses [[Symmetric-ke AKA – Authentication and Key Agreement a.k.a. 3G Authentication, Enhanced Subscriber Authorization (ESA). ...
    3 KB (439 words) - 03:34, 17 April 2022
  • ...isbn=978-0-471-11709-4|pages=56 et seq}}</ref> is a [[computer network]] [[authentication]] [[cryptographic protocol|protocol]] designed for use on insecure networks ...tp://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.3569 "A Logic of Authentication"]. ''ACM Transactions on Computer Systems'' 8 (1990), pp. 18&ndash;36.</ref ...
    3 KB (453 words) - 17:34, 2 March 2025
  • ...-protocols-118|title = An Overview of Different Authentication Methods and Protocols|date = 23 October 2001|access-date = 31 October 2015|website = www.sans.org ...otocol is to specify the exact series of steps needed for execution of the authentication. It has to comply with the main protocol principles: ...
    10 KB (1,431 words) - 23:19, 10 July 2024
  • ...ollection of [[Open-source software|open-source]] tools for [[AAA protocol|Authentication, Authorization and Accounting]] on an [[Open Access Network]]. It has been ...roject under the name ''Uni-Fy''. It is currently being used for wireless authentication at the Faculty of Science at the University of Trento and by the ''UniWirel ...
    3 KB (452 words) - 08:06, 25 June 2020
  • ...figuration expected by the Internet standards supporting many DNS -reliant protocols. David Barr published an opinion in [https://tools.ietf.org/html/rfc1912 RF ...e owner of the network that has been given an IP address. While weak, this authentication is strong enough that it can be used for whitelisting purposes because spam ...
    4 KB (605 words) - 21:09, 4 June 2025
  • ...s Server]] operating systems that provides centralized user [[AAA protocol|authentication, authorization and accounting]]. ...infrastructure for authentication. [[RADIUS]] is a standard for dedicated authentication servers. ...
    5 KB (649 words) - 11:35, 13 April 2025
  • ==Authentication, encryption and compression== ...orized modification and other DoS attacks. Authentication is optional. Two authentication schemes are supported: ...
    3 KB (408 words) - 15:10, 25 July 2024
  • {{short description|Microsoft authentication protocols}} '''Integrated Windows Authentication''' ('''IWA''')<ref> ...
    10 KB (1,244 words) - 18:31, 26 May 2024
  • ...tecture that provides a suite of [[subroutine|functions]] including login, authentication, and [[access control]] in a [[distributed system]]. To differ from other s DSSA/SPX is the [[authentication protocol]] of DSSA. The CDC is a [[Public key certificate|certificate]] gra ...
    2 KB (239 words) - 22:17, 18 March 2024
  • .... Bellovin|author2=M. Merritt|title=Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks|book-title=Proceedings of the I.E.E.E. Sy ...ffer|author2=G. Zorn|author3=H. Tschofenig|author4=S. Fluhrer|title=An EAP Authentication Method Based on the Encrypted Key Exchange (EKE) Protocol.|date=February 20 ...
    3 KB (457 words) - 16:17, 17 July 2022
  • '''Authentication, authorization, and accounting''' (AAA) is a framework used to control and [[Authentication]] is concerned with proving identity, [[authorization]] with granting permi ...
    5 KB (650 words) - 06:54, 14 November 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)