Authentication protocols

Results: 771



#Item
91Internet protocols / Two-factor authentication / Single sign-on / RADIUS / Authentication / Password / Multi-factor authentication / Extensible Authentication Protocol / Identity management / Security / Computer security / Access control

C OD E42 T E C HN O LO GY N OT E Two-factor Authentication Increases security, decreases risk

Add to Reading List

Source URL: essentials.code42.com

Language: English
92

draft-ietf-opsawg-hmac-sha-2-usm-snmp-06 - HMAC-SHA-2 Authentication Protocols in USM for SNMPv3

Add to Reading List

Source URL: tools.ietf.org

- Date: 2015-04-22 05:03:32
    93

    Insecure Real-World Authentication Protocols (or Why Phishing is so Profitable) Richard Clayton University of Cambridge, Computer Laboratory, William Gates Building, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdo

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2006-03-06 12:01:07
      94

      Secure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences Florida A & M University Tallahassee, Florida

      Add to Reading List

      Source URL: www.cs.fsu.edu

      Language: English - Date: 2012-09-05 15:29:38
        95

        Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models∗ Moni Naor† Gil Segev‡

        Add to Reading List

        Source URL: www.wisdom.weizmann.ac.il

        Language: English - Date: 2007-10-15 13:43:40
          96

          AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DEA reliable and ubiquitous network time service such as NTP requires some provision to prev

          Add to Reading List

          Source URL: www.eecis.udel.edu

          Language: English - Date: 1998-07-28 17:01:12
            97Data / Information / Communications protocol / Challenge-response authentication / Cryptography / Physical Unclonable Function / Randomness

            2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

            Add to Reading List

            Source URL: ieee-security.org

            Language: English - Date: 2013-04-05 19:56:34
            98Identity management / Financial cryptography / ISO standards / Credential / MULTOS / Smart card / Authentication / Proof of knowledge / Blind signature / Cryptographic protocols / Cryptography / Security

            Efficient Selective Disclosure on Smart Cards using Idemix? Pim Vullers1?? and Gergely Alp´ar1,2? ? ? 1 2

            Add to Reading List

            Source URL: www.cs.ru.nl

            Language: English - Date: 2013-02-25 09:57:31
            99Computer network security / Internet protocols / Password / Authentication / Network security / Phishing / Secure Shell / Security token / One-time password / Computer security / Security / Computing

            hardening authentication.indd

            Add to Reading List

            Source URL: www.nsa.gov

            Language: English - Date: 2013-08-12 08:28:39
            100Access control / Authentication / Notary / Packaging / Cryptographic protocols / Galois/Counter Mode / Cryptography / Security / Message authentication codes

            THE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES PRIMITIVES AND SCHEMES FOR NON-ATOMIC INFORMATION AUTHENTICATION

            Add to Reading List

            Source URL: www.cs.fsu.edu

            Language: English - Date: 2012-09-05 15:29:15
            UPDATE