Authentication protocol

Results: 881



#Item
31Get Connected with KSU WiFi – Windows 7 Note: Windows Wireless Manager must be enabled. KSU Service Desk Faculty & Staff: Students:

Get Connected with KSU WiFi – Windows 7 Note: Windows Wireless Manager must be enabled. KSU Service Desk Faculty & Staff: Students:

Add to Reading List

Source URL: uits.kennesaw.edu

Language: English - Date: 2015-11-25 10:43:55
32An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-11-25 11:04:54
33PAPI and LDAP Using directories for local authentication and authorization Diego R. López

PAPI and LDAP Using directories for local authentication and authorization Diego R. López

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2007-10-13 04:03:53
34November 2013 Newsletter Five Things You Should Never Say at Work! There are certain statements that are considered toxic in the workplace, according to Barbara

November 2013 Newsletter Five Things You Should Never Say at Work! There are certain statements that are considered toxic in the workplace, according to Barbara

Add to Reading List

Source URL: www.theeap.com

Language: English - Date: 2015-04-20 22:13:08
35Secure Authentication System for Public WLAN Roaming Yasuhiko Matsunaga† Ana Sanz Merino †  Takashi Suzuki‡

Secure Authentication System for Public WLAN Roaming Yasuhiko Matsunaga† Ana Sanz Merino † Takashi Suzuki‡

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-03-08 14:47:48
36MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
37Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:59:39
38Sound Proof of Proximity of Knowledge Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

Sound Proof of Proximity of Knowledge Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
39Password Authenticated Key Agreement for Contactless Smart Cards Dennis Kügler1, Heike Neumann2, Sebastian Stappert2, Markus Ullmann1, Matthias Vögeler2 1

Password Authenticated Key Agreement for Contactless Smart Cards Dennis Kügler1, Heike Neumann2, Sebastian Stappert2, Markus Ullmann1, Matthias Vögeler2 1

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:14
40Name : Azamuddin Rotation Project Title : Survey on IoT Security Outline : • • •

Name : Azamuddin Rotation Project Title : Survey on IoT Security Outline : • • •

Add to Reading List

Source URL: www.cs.wustl.edu

Language: English - Date: 2016-01-09 09:36:29