Authentication protocol

Results: 881



#Item
21Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-23 04:37:54
22Wireless networking / Computing / Wireless / Technology / Wireless LAN / Wireless access point / Wi-Fi / Wireless network / Supplicant / IEEE 802.1X / Wired Equivalent Privacy / Extensible Authentication Protocol

Microsoft Word - Wireless Network StandardFinal.docx

Add to Reading List

Source URL: eits.uga.edu

Language: English - Date: 2015-10-21 16:49:33
23Computing / Wireless networking / Computer security / Cryptography / Computer network security / Extensible Authentication Protocol / Internet protocols / Wi-Fi / IEEE 802.1X / Xsupplicant / Authentication protocol / RADIUS

802.1x/EAP Authentication Guide RadiusNT/X V5.1 IEA Software, Inc. Administrative and Support Office PO BOX 1170

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2013-02-15 13:27:42
24Computer access control / Computer security / Computing / Security token / Multi-factor authentication / Authentication / RSA SecurID / Mutual authentication / OAuth / OpenID / Electronic authentication / Extensible Authentication Protocol

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-20 14:35:18
25Cryptography / Computing / Computational complexity theory / Proof of knowledge / IP / Distribution / Challengeresponse authentication / Communications protocol / ZK / Zero-knowledge proof

Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2) Definition of zero-knowledge (ZK)

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-03-06 05:37:28
26Computing / Directory services / Software / Computer architecture / Computer access control / Lightweight Directory Access Protocol / Active Directory

Authentication, Authorisation and Windows Integration using SSSD Lawrence Kearney Mark Robinson

Add to Reading List

Source URL: www.susecon.com

Language: English - Date: 2015-11-20 11:18:31
27Computing / Computer access control / Computer security / Cryptography / Cryptographic protocols / Hypertext Transfer Protocol / Secure communication / Internet protocols / Transport Layer Security / Digest access authentication / Basic access authentication / Form-based authentication

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D1.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:48
28Cryptography / Cryptographic hash functions / Error detection and correction / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / SHA-2 / Hash function / SHA-1 / Block cipher / Galois/Counter Mode

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-05 11:52:34
29Computing / Cryptography / Wireless networking / Computer security / Cryptographic protocols / IEEE 802.11u / Computer network security / Extensible Authentication Protocol / IEEE 802.11 / Authentication

November 2007 doc.: IEEE2786r0 IEEE P802.11 Wireless LANs Liaison from IETF EMU to IEEEDate:

Add to Reading List

Source URL: mentor.ieee.org

Language: English - Date: 2011-06-28 18:39:10
30Computer access control / Computer security / Access control / Multi-factor authentication / One-time password / Security token / Authentication / Mobile security / Password / Electronic authentication / Extensible Authentication Protocol

Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:03
UPDATE