Authentication protocol

Results: 881



#Item
241System software / Wireless networking / Wireless security / Wireless tools for Linux / Ubuntu / GNOME / NetworkManager / Wi-Fi / Extensible Authentication Protocol / Software / Computer network security / Computing

UniWide Setup Guide for Ubuntu 7.10 Prerequisites: •

Add to Reading List

Source URL: www.it.unsw.edu.au

Language: English - Date: 2010-03-11 21:27:28
242Information / ZRTP / Man-in-the-middle attack / Key-agreement protocol / Public key fingerprint / Secure Real-time Transport Protocol / Authentication / SAS / Secure voice / Cryptographic protocols / Cryptography / Security

Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments 1. Dominik Schürmann

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-05-31 08:50:04
243Technology / Extensible Messaging and Presence Protocol / Text messaging / Instant messaging / Presence information / Smartphone / MobileMe / Internet Relay Chat / Two-factor authentication / Computing / Online chat / Computer-mediated communication

Poster: Towards Continuous Authentication Based On Mobile Messaging App Usage Eric Klieme NovaTec Consulting GmbH DieselstraßeLeinfelden-Echterdingen

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-07-06 08:47:40
244Protected Extensible Authentication Protocol / Technology / Eduroam / Wi-Fi / Telecommunications engineering / Extensible Authentication Protocol / Wpa supplicant / Wireless networking / Computer network security / Computing

Microsoft Word#Eduroam Wireless Setup for Microsoft Windows XP.DOCX

Add to Reading List

Source URL: icts.unsw.adfa.edu.au

Language: English - Date: 2015-02-23 19:47:48
245Wi-Fi / Protected Extensible Authentication Protocol / Technology / Eduroam / Telecommunications engineering / Password / Extensible Authentication Protocol / Comparison of wireless LAN clients / Computer network security / Wireless networking / Computing

Microsoft Word#Eduroam Wireless Setup for Microsoft Windows 7.DOCX

Add to Reading List

Source URL: icts.unsw.adfa.edu.au

Language: English - Date: 2015-02-23 19:47:14
246Radio / Radio-frequency identification / Information / Ultra-wideband / Challenge-response authentication / Telecommunications engineering / Technology / Distance-bounding protocol

An RFID distance bounding protocol Computer Laboratory Gerhard P. Hancke, Markus G. Kuhn Security Group / TAMPER Lab

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:54
247Access control / Key management / Simple public key infrastructure / Authentication / PERMIS / Authorization / Credential / Lightweight Directory Access Protocol / Trust management / Security / Identity management / Computer security

A research and education initiative at the MIT Sloan School of Management Delegation Logic: A Logic-based Approach to Distributed Authorization Paper 115

Add to Reading List

Source URL: ebusiness.mit.edu

Language: English - Date: 2012-11-08 09:59:25
248Public-key cryptography / Password authentication protocol / Key-agreement protocol / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Encrypted key exchange

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-13 20:50:57
249Data / Internet protocols / Universal composability / Authentication protocol / Password authentication protocol / Radio-frequency identification / Cryptography / Cryptographic protocols / Information

Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros Department of Computer Science, Florida State University Tallahassee, Florida, FL

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-05 18:44:49
250Universal composability / Authentication protocol / Password authentication protocol / Secure multi-party computation / Integrated Windows Authentication / Authentication / Password / Man-in-the-middle attack / Kerberos / Cryptography / Cryptographic protocols / Security

Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-20 14:16:00
UPDATE