Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,384,119 papers from all fields of science
Search
Sign In
Create Free Account
NT LAN Manager
Known as:
NTLM
, NTLMv1
, NTLMv2
In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Challenge–response authentication
Cross-site scripting
Features new to Windows 7
Group Policy
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Configuring Authentication and Security
Vlad Catrinescu
,
Trevor Seward
Deploying SharePoint
2019
Corpus ID: 64224028
In this chapter, we will cover the various mechanisms for authentication, authorization, and security for your SharePoint farm…
Expand
2018
2018
Plugin Authentification NTLM - Manuel d'administration v1.0.0
laurenceutilisateurs
2018
Corpus ID: 235106097
2016
2016
Environmental Toxicology PHOTOTOXIC TARGET LIPID MODEL OF SINGLE POLYCYCLIC AROMATIC HYDROCARBONS
Bryson
,
É.
,
+10 authors
D. Toro
2016
Corpus ID: 29674369
A phototoxic target lipid model (PTLM) is developed to predict phototoxicity of individual polycyclic aromatic hydrocarbons (PAHs…
Expand
2014
2014
Reducing Decryption Time of NTLM Hash Using Rainbow Tables
Gurdev Singh
2014
Corpus ID: 62939256
The majority of computer systems are still protected primarily with a user name and password, and many users employ the same…
Expand
Review
2013
Review
2013
A Review of NTLM Rainbow Table Generation Techniques
M. Malhotra
,
Bhushan Dua
2013
Corpus ID: 53863815
Rainbow tables reduce the difficulty in brute force cracking a single password by creating a large pre-generated data set of…
Expand
2012
2012
Discarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs even Faster
G. Avoine
,
A. Bourgeois
,
Xavier Carpent
IACR Cryptology ePrint Archive
2012
Corpus ID: 9776615
Cryptanalytic time-memory trade-offs were introduced by Hellman in 1980 in order to perform key-recovery attacks on cryptosystems…
Expand
2010
2010
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
B. Groza
,
M. Minea
Financial Cryptography
2010
Corpus ID: 11068004
Starting from algebraic properties that enable guessing low-entropy secrets, we formalize guessing rules for symbolic…
Expand
2009
2009
Details of the NTLM Authentication Protocol
J. Ying
2009
Corpus ID: 64420462
NTLM protocol is an import part of integrated windows authentication. In the network environment, NTLM authentication protocol is…
Expand
2008
2008
On the security of some authentication mechanisms from Windows
B. Groza
,
Andrei Alexandroni
,
I. Silea
,
V. Patriciu
2008
Corpus ID: 18636994
The paper investigates some authentication mechanisms used in Windows. In particular, the NTLM authentication protocol, which is…
Expand
2006
2006
SPNEGO-based Kerberos and NTLM HTTP Authentication in Microsoft Windows
K. Jaganathan
,
Larry Zhu
,
J. Brezak
Request for Comments
2006
Corpus ID: 41554466
This document describes how the Microsoft Internet Explorer (MSIE) and Internet Information Services (IIS) incorporated in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE