Integrated Windows Authentication itself is not a standard or an authentication protocol.
Using this notation, the assumptions behind an authentication protocol can be formalized.
Kerberos, an authentication protocol, part of Project Athena, still used today.
A claimant authenticates his or her identity to a verifier by the use of a token and an authentication protocol.
If there's a challenge/response authentication protocol, the app has all the info for the adversary to execute it.
He is described as the personification of a sophisticated challenge-handshake authentication protocol which guards the Oracle.
UPnP does not have a lightweight authentication protocol, while the available security protocols are complex.
It does not deal with tasks such as templating for output rendering, backend access or authentication protocols.
They have extended authentication protocols for small networks.
A further paper proposed using it as an authentication protocol, which was subsequently broken.