Authentication protocol

Results: 881



#Item
101Wireless networking / Cryptographic protocols / Computer access control / Computer network security / Authentication protocol / Mutual authentication / Digest access authentication / Extensible Authentication Protocol / Authentication / Man-in-the-middle attack

Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Add to Reading List

Source URL: asokan.org

Language: English - Date: 2015-04-08 16:31:41
102Cryptography / Computer network security / Computer security / Cyberwarfare / Kerberos / Key distribution center / Authentication protocol / Authentication / Ticket

Stealing credentials for impersonation Emmanuel Bouillon October 29, 2010 Introduction

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2010-10-29 15:08:35
103

Analysis of a Biometric Authentication Protocol for Signature Creation Application A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-07-24 09:49:57
    104Computing / Software / Hypertext Transfer Protocol / Internet privacy / Cryptographic protocols / Secure communication / Cross-site request forgery / Computer access control / HTTP cookie / Same-origin policy / Basic access authentication / JavaScript

    Lightweight Server Support for Browser-Based CSRF Protection Alexei Czeskis University of Washington Alexander Moshchuk

    Add to Reading List

    Source URL: www2013.wwwconference.org

    Language: English - Date: 2014-07-21 08:47:06
    105

    End-to-end Design of a PUF based Privacy Preserving Authentication Protocol Aydin Aysu (Virginia Tech) Ege Gulcan (Virginia Tech) Daisuke Moriyama (NICT) Patrick Schaumont (Virginia Tech)

    Add to Reading List

    Source URL: www.cryptoexperts.com

    Language: English - Date: 2015-11-13 04:48:41
      106

      Unpicking PLAID A Cryptographic Analysis of an ISO-standardstrack Authentication Protocol SSR 2014, RHUL, United Kingdom Jean Paul Degabriele Kenneth G. Paterson

      Add to Reading List

      Source URL: ssr2015.com

      Language: English - Date: 2015-06-22 06:35:00
        107

        Modeling the ISO 9798–2.4 Authentication Protocol Britta Hale Colin Boyd

        Add to Reading List

        Source URL: ssr2015.com

        Language: English - Date: 2015-06-22 06:35:29
          108

          RFC 7235 : Hypertext Transfer Protocol (HTTP/1.1): Authentication St´ephane Bortzmeyer <> Premi`ere r´edaction de cet article le 16 juin 2014

          Add to Reading List

          Source URL: www.bortzmeyer.org

          Language: French - Date: 2016-01-16 13:38:35
            109Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

            Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

            Add to Reading List

            Source URL: ect.bell-labs.com

            Language: English - Date: 2010-12-15 21:38:44
            110Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner

            S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

            Add to Reading List

            Source URL: www-users.cs.umn.edu

            Language: English - Date: 2007-07-26 16:56:51
            UPDATE