Authentication protocol

Results: 881



#Item
841Computing / Information / Cost estimation in software engineering / EMI / Communications protocol / Usability / UUCP / Application programming interface / Two-factor authentication / Network protocols / Technical communication / Technology

Project Estimation With Use Case Points Roy K. Clemmons

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-11-04 17:04:30
842Information / Challenge-response authentication / IP / Commitment scheme / NP / Transmission Control Protocol / Communications protocol / Error detection and correction / Alice and Bob / Cryptographic protocols / Data / Cryptography

Distance Bounding in Noisy Environments Dave Singel´ee and Bart Preneel ESAT-COSIC, K.U.Leuven,

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
843Public-key cryptography / Access control / ISO standards / Ubiquitous computing / Smart card / Authentication protocol / Public key infrastructure / Subscriber identity module / Password authentication protocol / Cryptography / Security / Cryptographic protocols

LNCS[removed]Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card

Add to Reading List

Source URL: researcher.watson.ibm.com

Language: English - Date: 2010-04-12 17:49:56
844First-order logic / Needham–Schroeder protocol / Kerberos / Cyberwarfare / Mathematics / Burrows–Abadi–Needham logic / Cryptography / Logic

A Logic of Authentication M. Burrows, M. Abadi, R. Needham Robert Harper

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2007-09-13 10:55:29
845Off-the-Record Messaging / Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Secure communication / Man-in-the-middle attack / Secure Shell / MQV / Internet Key Exchange / Cryptographic protocols / Cryptography / Deniable authentication

Secure Off-the-Record Messaging Mario Di Raimondo

Add to Reading List

Source URL: www.dmi.unict.it

Language: English - Date: 2005-09-03 05:31:59
846Internet protocols / Wireless / Information / Security / Challenge-response authentication / Password authentication protocol / Authentication protocol / Automatic identification and data capture / Computing / Radio-frequency identification

The Swiss-Knife RFID Distance Bounding Protocol Chong Hee Kim , Gildas Avoine, Fran¸cois Koeune , Fran¸cois-Xavier

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2011-02-26 09:55:10
847Internet protocols / Computer network security / HOTP / One-time password / Two-factor authentication / Password authentication protocol / Password / Authentication server / Authentication / Computer security / Security / Cryptography

HOTP-Based User Authentication Scheme in Home Networks Binod Vaidya1 , Jong Hyuk Park2 , and Joel J.P.C. Rodrigues3

Add to Reading List

Source URL: netgna.it.ubi.pt

Language: English - Date: 2011-03-16 07:13:06
848Computer security / Kerberos / Ticket Granting Ticket / Key distribution center / Single sign-on / Authentication server / Ticket / Secure Shell / Network Information Service / Computing / Computer network security / Cryptography

The MIT Kerberos Administrator’s How-to Guide Protocol, Installation and Single Sign On By Jean-Yves Migeon

Add to Reading List

Source URL: www.kerberos.org

Language: English - Date: 2008-07-23 12:35:04
849Routing / Internet standards / Internet protocols / Border Gateway Protocol / IP hijacking / Classless Inter-Domain Routing / IP address / IPv6 / Autonomous system / Network architecture / Internet / Computing

Origin Authentication in Interdomain Routing William Aiello

Add to Reading List

Source URL: www.patrickmcdaniel.org

Language: English - Date: 2013-08-29 10:14:07
850Computer network security / IEEE 802.11 / Computing / Technology / Wi-Fi / Wi-Fi Protected Access / IEEE 802.11i-2004 / Extensible Authentication Protocol / Temporal Key Integrity Protocol / Cryptographic protocols / Wireless networking / Cryptography

Q&A WPA2™

Add to Reading List

Source URL: www.wi-fi.org

Language: English - Date: 2010-06-05 11:49:43
UPDATE