Javascript is disabled. Please enable it for better working experience.

Showing results for : Kerberos Authentication

About 10 results ( 0,38 seconds)

Ftp Security Extensions
http://www.researchomatic.com/Ftp-Security-Extensions-9288.html

FTP) security extensions. The File Transfer Protocol (FTP) presently delineated in STD 9, RFC 959 and in position on the Internet benefits usernames and passwords passed in clear text to authenticate customers to servers (via the USER and P...

Usability
http://www.researchomatic.com/Usability-11944.html

to investigate customer perceptions of usability, convenience and security in two-factor (2-factor) authentication. 2-factor authentication is a security solution requiring the verification of two different modalities of authentication comp...

Password Security
http://www.researchomatic.com/Password-Security-144997.html

password authentication scheme in relation to the careless behaviour of users have been highlighted in this project. Moreover, the existing complex and hard-to-implement alternatives will also be discussed in order to cope with them. It hel...

System Security Technology
http://www.researchomatic.com/System-Security-Technology-17760.html

“biometrics” comes from the Greek language and is derived from the words bio (life) and metric (to measure). This paper will refer to biometrics as the technologies used to measure and analyze personal characteristics, both physiological a...

Disseminating Organizational It Security And Troubleshooting Best Practices
http://www.researchomatic.com/disseminating-organizational-it-security-and-troubleshooting-best-practices-157624.html

Disseminating Organizational IT Security and Troubleshooting Best Practices User Authentication Policies to Improve the Network’s Security Authentication policy may be defined as a set of instructions which may be applied to the authenticat...

Online Payment Fraud
http://www.researchomatic.com/Online-Payment-Fraud-35307.html

online payement fraud. In the past, e-commerce companies utilized only bank accounts; users specified amounts of money that were then taken from their accounts and converted to digital money. However, one of the latest trends in digital cas...

Security Analysis Mobile Adhoc Networks
http://www.researchomatic.com/Security-Analysis-Mobile-Adhoc-Networks-12363.html

security in MANET is hard to achieve due to the vulnerability of the link, the limited physical protection of the nodes, and the absence of a certification authority or centralized management point. The existing security proposals in ad hoc...