- Biometrics@ (1)
- Kerberos (2)
- Products and Services@ (1)
- Kerberos: The Network Authentication Protocol | What is Kerberosweb.mit.edu/kerberos/www
- Mosaic User Authentication Tutorial Introduction This tutorial surveys the current methods in NCSA Mosaic and NCSA HTTPd for restricting access to documents. The tutorial also walks through setup and use of these methods. Mosaic 2.0 and NCSA HTTPd allow access restriction based on several criteria: Username/password-level access authorization. Rejection or acceptance of connections based on ...hoohoo.ncsa.uiuc.edu/docs/tutorials/user.html
- www.w3.org/TR/NOTE-authentform
- www.w3.org/Library/src/HTAAUtil.html
- www.w3.org/Library/src/HTAABrow.html
- www.crystalinks.com/telepathy.html
- Security Issues in Embedded Networking | Introduction | What's the problem | What are the solutions | Nothing at all | Passwords | Secure SNMP | The Kerberos Authentication System | How Kerberos Workswww.mit.edu/people/eichin/embedded-kerberos.html
- www.w3.org/Jigsaw/Doc/User/AuthInJigsaw.html