Authentication protocol

Results: 881



#Item
91Computer security / Cryptography / Computer access control / Cybercrime / Social engineering / Cloud standards / Hypertext Transfer Protocol / Phishing / Password / Cross-site scripting / OpenID / Multi-factor authentication

PhishSafe: Leveraging Modern JavaScript API’s for Transparent and Robust Protection Bastian Braun Martin Johns

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
92Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Communications protocol / Logic / Security protocol notation

JuneEncryption as an Abstract Datatype: an extended abstract

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
93Computing / Cryptography / Computer network security / Computer security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol

The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 08:24:10
94Computer network security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol / AuthIP

Microsoft PowerPoint - LinuxTag2009_Flyer_VPN_Solution.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2009-06-21 15:09:29
95Cryptography / Computational complexity theory / Distance-bounding protocol / Public-key cryptography / Complexity classes / Proof of knowledge / IP / Challengeresponse authentication / NP / Digital signature / Security parameter / Negligible function

Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:32:58
96Computing / Internet / Cryptography / Internet protocols / Internet Standards / Email / Transport Layer Security / Domain name system / Opportunistic TLS / Postfix / DNS-based Authentication of Named Entities / Simple Mail Transfer Protocol

Continuous Measurement Platforms can help Mitigate Pervasive Surveillance Julian Kornberger Carsten Bormann RAIM Workshop, Saturday, 2015–10–31, Yokohama, JP Introduction

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2016-01-05 05:04:04
97

End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol? Aydin Aysu1 , Ege Gulcan1 , Daisuke Moriyama2 , Patrick Schaumont1 , and Moti Yung3 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-11 01:25:32
    98Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / Cipher suite

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2014-02-27 10:40:02
    99Cryptography / FIPS 201 / Standards / Smart cards / Computer access control / ISO standards / Ubiquitous computing / ISO/IEC / Authentication / PIV / Cryptographic protocol / Public-key cryptography

    ITL Bulletin: Improved Security and Mobility Through Updated Interfaces for PIV Cards (July 2015)

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-07-21 08:41:09
    100Secure communication / Cryptographic protocols / Internet Standards / Computer network security / Transport Layer Security / HTTPS / OpenSSL / Cipher suite / Handshaking / End-to-end encryption / Middlebox / Extensible Authentication Protocol

    Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2015-07-29 16:55:02
    UPDATE