Authentication protocol

Results: 881



#Item
851Wireless / Telecommunications engineering / Automatic identification and data capture / Privacy / Radio-frequency identification / Challenge-response authentication / Distance-bounding protocol / Man-in-the-middle attack / Communications protocol / Information / Data / Cryptographic protocols

Preparation of Papers for the First EURASIP Workshop on RFID Technology

Add to Reading List

Source URL: www.eurasip.org

Language: English - Date: 2009-04-03 09:44:44
852Cryptography / MS-CHAP / Point-to-Point Tunneling Protocol / Password / Challenge-response authentication / Authentication protocol / Crypt / LM hash / NTLM / Computing / Computer security / Internet protocols

Exploiting known security holes in Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Jochen Eisinger

Add to Reading List

Source URL: penguin-breeder.org

Language: English - Date: 2003-02-21 09:40:07
853Data / Information / Communications protocol / Challenge-response authentication / Cryptography / Physical Unclonable Function / Randomness

2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:34
854Computing / Information / Cost estimation in software engineering / EMI / Communications protocol / Usability / UUCP / Application programming interface / Two-factor authentication / Network protocols / Technical communication / Technology

Project Estimation With Use Case Points Roy K. Clemmons

Add to Reading List

Source URL: www.bfpug.com.br

Language: English - Date: 2013-09-01 13:50:00
855Security / Password / Challenge-response authentication / Digest access authentication / Secure Remote Password protocol / Man-in-the-middle attack / Zero-knowledge proof / OTPW / Security token / Cryptography / Cryptographic protocols / Computer security

PDF Document

Add to Reading List

Source URL: drmlab.org

Language: English - Date: 2008-12-04 05:05:52
856Computing / Wireless networking / Technology / Data / IEEE 802.11 / Wi-Fi Protected Access / Extensible Authentication Protocol / Wi-Fi Alliance / EAP-SIM / Wi-Fi / Cryptographic protocols / Computer network security

Microsoft Word - WFA _Security EAP FAQ_04_12_05.doc

Add to Reading List

Source URL: www.wi-fi.org

Language: English - Date: 2011-11-08 13:12:08
857Cryptographic protocols / Technology / Cryptography / IEEE 802.11 / Wi-Fi / Wireless security / Wi-Fi Protected Access / IEEE 802.11i-2004 / Extensible Authentication Protocol / Wireless networking / Computer network security / Computing

Microsoft Word - WPA for Public Access - Final.doc

Add to Reading List

Source URL: www.wi-fi.org

Language: English - Date: 2010-06-05 11:50:09
858Key management / Cryptographic protocols / Vehicular communication systems / Digital signature / Vehicular ad-hoc network / Secure Real-time Transport Protocol / Extensible Authentication Protocol / Cryptography / Wireless networking / Public-key cryptography

Microsoft Word - Contents-Bangkok08-5.doc

Add to Reading List

Source URL: www.waset.org

Language: English - Date: 2013-02-02 13:01:45
859Complexity classes / IP / Challenge-response authentication / NP / Commitment scheme / Alice and Bob / Distance-bounding protocol / Interactive proof system / Cryptography / Cryptographic protocols / Applied mathematics

delay_measurem.eps

Add to Reading List

Source URL: www.syssec.ethz.ch

Language: English - Date: 2010-06-07 06:13:30
860Computing / Sender Rewriting Scheme / Sender Policy Framework / Non delivery report / Email forwarding / Simple Mail Transfer Protocol / Transmission Control Protocol / Bounce address / Hash function / Email authentication / Email / Computer-mediated communication

PDF Document

Add to Reading List

Source URL: www.libsrs2.org

Language: English - Date: 2004-06-05 16:09:17
UPDATE