Search

Your search keyword '"NT LAN Manager"' showing total 44 results

Search Constraints

Start Over You searched for: Descriptor "NT LAN Manager" Remove constraint Descriptor: "NT LAN Manager"
44 results on '"NT LAN Manager"'

Search Results

1. Research on Hadoop Identity Authentication Based on Improved Kerberos Protocol

2. Wireless LAN Security Vulnerabilities and Improvement Measures

3. Disconnection of Wireless LAN Attack and Countermeasure

4. Design of LAN Platform for the Fusion of Communication and Networking

5. An Authentication Interworking Mechanism between Multiple Wireless LANs for Sharing the Network Infrastructure

6. Implementation of a Secure Wireless LAU System using AP Authentication and Dynamic Key Exchange

7. A hybrid authentication protocol for large mobile network

8. A self-encryption mechanism for authentication of roaming and teleconference services

9. Kerberos authentication in Windows NT 5.0 domains

10. Developing a Windows NT security policy

11. Windows NT security

12. A Multi-server Architecture Authentication Protocol Using Smart Card

13. Modeling and Verification of Kerberos Protocol Using Symbolic Model Verifier

14. Distributed lightweight Kerberos protocol for Mobile Agent Systems

15. An improved Kerberos protocol based on fast RSA algorithm

16. On Authentication System Based on 802.1X Protocol in LAN

17. Modeling and verification of Extensible Authentication Protocol for Transport Layer Security in Wireless LAN Environment

18. Authentication for distributed systems

19. Network authentication protocol based on McroPayment protocol

20. Improvements of authentication tests on detecting type flaw attacks

21. Improving kerberos security through the combined use of the timed authentication protocol and frequent key renewal

22. A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection

23. Designing an Authentication Protocol via Authentication Test

24. Introducing Windows Authentication

25. An Effective Authentication Procedure Considering User Expiry Time During Handover

26. Implementation and Performance Evaluation of EAP-TLS-KS

27. Authentication Components: Engineering Experiences and Guidelines

28. Security Analysis on Chinese Wireless LAN Standard and Its Solution

29. Analyzing GetFileVersion and MySQL Passwordless Test

30. Provably secure entity authentication the three party case

31. A secure public wireless LAN access technique that supports walk-up users

32. Security algorithms in wireless LAN: proprietary or nonproprietary

33. Secure wireless LAN service at a COOP cafeteria

34. Introducing Windows Authentication

35. Management and Control Protocols

36. Strong User Authentication in IEEE802.11 Wireless LAN

37. Design of an integrated services LAN architecture

38. Distributed remote LAN administration tool for Windows NT and 2000-based LANs: preliminary work

39. Enterprise Security Scenarios

40. Distributed security services in Microsoft Windows NT 5.0 — Kerberos and the active directory

41. Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience

42. Vendors push wireless LAN security

43. LAN management in an IBM framework

44. Pre-authenticated signaling in wireless LANs using 802.1X access control

Catalog

Books, media, physical & digital resources