Authentication protocol

Results: 881



#Item
81

Arista v. Cisco Request 15 Oct 15 Authentication requested for: RFC 2401 Security Architecture for the Internet Protocol

Add to Reading List

Source URL: iaoc.ietf.org

- Date: 2015-11-01 16:21:27
    82Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Transport Layer Security / Hypertext Transfer Protocol / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2014-02-27 10:40:02
    83Computer security / Computer access control / Security / Federated identity / Access control / Authentication / Notary / Packaging / Biometrics / Cryptographic protocol / Identity management / Password

    Abstract Identity Management through Privacy-Preserving Authentication Ewa Syta Yale University

    Add to Reading List

    Source URL: ewa.syta.us

    Language: English - Date: 2016-04-16 15:06:35
    84Computing / Software engineering / Cryptography / ISO standards / Computer access control / FIDO Alliance / Identification / Mountain View /  California / Authentication / Smart card application protocol data unit / Fido / Fog Investigation and Dispersal Operation

    PDF Document

    Add to Reading List

    Source URL: fidoalliance.org

    Language: English - Date: 2015-06-29 13:40:30
    85Computer access control / Access control / Cryptography / Computer security / FIDO Alliance / Authentication / YubiKey / Password / Multi-factor authentication / Hypertext Transfer Protocol / Challengeresponse authentication

    FIDO U2F Raw Message Formats FIDO Alliance Proposed Standard 14 May 2015 This version: https://fidoalliance.org/specs/fido-undefined-undefined-psfido-u2f-raw-message-formats-v1.0-undefined-pshtml Prev

    Add to Reading List

    Source URL: fidoalliance.org

    Language: English - Date: 2015-06-29 13:40:34
    86

    Lapin: An Efficient Authentication Protocol Based on Ring-LPN Stefan Heyse1 , Eike Kiltz1 , Vadim Lyubashevsky2? , Christof Paar1 , and Krzysztof Pietrzak3?? 1

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2012-06-28 05:35:56
      87

      Getting web authentication right A best-case protocol for the remaining life of passwords Joseph Bonneau University of Cambridge

      Add to Reading List

      Source URL: www.jbonneau.com

      Language: English - Date: 2014-05-03 16:10:03
        88

        1 IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups Nidal Aboudagga∗ ,Giacomo de Meulenaer∗ , Mohamed Eltoweissy† and Jean-Jacques Quisquater∗ ∗ UCL-Crypto group, Place du Levant 3, 1

        Add to Reading List

        Source URL: www.uclouvain.be

        Language: English - Date: 2011-12-14 05:30:34
          89

          Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk

          Add to Reading List

          Source URL: www.cs.bham.ac.uk

          Language: English - Date: 2009-02-25 10:33:23
            90Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

            - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

            Add to Reading List

            Source URL: security-lab.jaist.ac.jp

            Language: English - Date: 2015-11-09 21:16:55
            UPDATE