Access key

Results: 1959



#Item
171Cryptography / Computer security / Computer access control / Public key infrastructure / Public-key cryptography / Key management / Password / Salt / Key / Kerberos / Challengeresponse authentication / Passphrase

Pico without public keys Frank Stajano1 , Bruce Christianson2 , Mark Lomas3 Graeme Jenkinson1 , Jeunese Payne1 , Max Spencer1 , Quentin Stafford-Fraser1 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 14:25:32
172

Microsoft Word - GR-EBLIDA Key Principles on the acquisition of and access to E-books by libraries.docx

Add to Reading List

Source URL: www.eblida.org

Language: Greek - Date: 2013-06-07 10:55:45
    173Cryptography / Computer security / Computer access control / Cryptographic hash functions / Key management / Password / Security / Salt / Crypt / Passwd / Challengeresponse authentication / Key stretching

    PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-12-09 05:42:43
    174Software / Cryptographic software / Computing / Secure Shell / System software / Key management / Comparison of SSH servers / Ssh-agent / Ssh-keygen

    ITL BULLETIN FOR JANUARY 2016 SECURING INTERACTIVE AND AUTOMATED ACCESS MANAGEMENT USING SECURE SHELL (SSH) Murugiah Souppaya, Karen Scarfone, 1 and Larry Feldman, 2 Editors Computer Security Division Information Technol

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-01-11 10:13:44
    175Cryptography / Key management / Public key infrastructure / Identity management / Computer access control / Social networking services / Internet privacy / Authentication / Privacy / Web of trust / Airbnb / Public key certificate

    Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data A White Paper from Rebooting the Web of Trust

    Add to Reading List

    Source URL: www.weboftrust.info

    Language: English - Date: 2016-06-08 16:57:37
    176Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

    The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:14
    177

    Sport Fish Restoration & Boating Trust Fund Key Conservation and Recreation Access User Pay-Public Benefits Fund must be reauthorized as part of the Surface Transportation Bill. eight Year Accomplishments

    Add to Reading List

    Source URL: www.nasbla.org

    Language: English - Date: 2014-11-12 13:40:38
      178Cryptography / Computer security / Security / ISO standards / Computer network security / Computer access control / Smart card / Ubiquitous computing / Authentication / Public-key cryptography / FIPS 140-2 / Security and safety features new to Windows Vista

      Microsoft Word - SC037 _2015__v3

      Add to Reading List

      Source URL: www.stc.tid.gov.hk

      Language: English - Date: 2015-10-01 12:03:19
      179

      VLDB Journal manuscript No. (will be inserted by the editor) The Ontological Key: Automatically Understanding and Integrating Forms to Access the Deep Web Tim Furche · Georg Gottlob · Giovanni Grasso ·

      Add to Reading List

      Source URL: christian.schallhart.net

      Language: English - Date: 2015-08-22 10:39:59
        180Cryptography / Certificate authority / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / English phonology

        IdenTrust ACES Access Certificates for Electronic Services

        Add to Reading List

        Source URL: www.identrust.com

        Language: English - Date: 2012-03-09 18:45:16
        UPDATE