Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John Hal Howard is active.

Publication


Featured researches published by John Hal Howard.


Archive | 1999

Authenticating access to a network server without communicating login information through the network server

John Hal Howard; Jeffrey C. Kunins; Darren L. Anderson; Ryan W. Battle; Max E. Metral


Archive | 1999

Controlling access to a network server using an authentication ticket

John Hal Howard; Jeffrey C. Kunins; Darren L. Anderson; Ryan W. Battle; Max E. Metral


Archive | 2002

Session key security protocol

Wei-Quiang Michael Guo; John Hal Howard; Kok Wai Chan


Archive | 2004

Authentication broker service

John Hal Howard; Daniel Salvatore Schiappa; Khaja E. Ahmed; Kyle S. Young


Archive | 2001

In-line sign in

Christopher E. Mitchell; Ryan W. Battle; Darren L. Anderson; Joshua G. Poley; Greg A. Marks; John Hal Howard


Archive | 2003

Authenticating user access to a network server without communicating user authentication cookie to the network server

John Hal Howard; Jeffrey C. Kunins; Darren L. Anderson; Ryan W. Battle; Max E. Metral


Archive | 2008

Reward for resurrecting teammate in a multiplayer game

Derek J. Carroll; John Hal Howard


Archive | 1996

Moving a messaging system mailbox

Ramesh Babu Pabbati; Patrick Yu-Kwan Ng; John Hal Howard; William H. Rockenbeck; Max L. Benson


Archive | 2003

Authentication method and system encrypting a ticket with an symmetric key, said symmetric key being encrypted with an asymmetric key

Wei-Quiang M. Guo; John Hal Howard; Kok Wai Chan


Archive | 2003

Accessing a server using a user authentication indicator

John Hal Howard; Jeffrey C. Kunins; Darren L. Anderson; Ryan W. Battle; Max E. Metral

Collaboration


Dive into the John Hal Howard's collaboration.

Researchain Logo
Decentralizing Knowledge