Authentication protocols

Results: 771



#Item
121Computer security / Computer network security / Authentication protocol / Authentication / Kerberos / Cryptography / Cryptographic protocols / Security

Demarcation of Security in Entity Authentication Protocols Naveed Ahmed & Christian D. Jensen DTU Informatics, Denmark July 6, 2011

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:29:53
122Cryptographic protocols / Internet / Data / Secure communication / Transport Layer Security / Cipher suite / Lightweight Directory Access Protocol / FTPS / Extensible Authentication Protocol / Computing / Internet standards / Internet protocols

Advanced Client/Server Authentication in TLS Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith Computer Science Department Brigham Young University Provo, Utah, USA 84602

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-26 10:17:06
123Internet standards / Access token / Computer security / OAuth / JavaScript / OpenID / Hypertext Transfer Protocol / Security token / RADIUS / Computing / Cloud standards / Internet protocols

Device Token Protocol for Persistent Authentication Shared Across Applications John Trammel, Ümit Yalçınalp, Andrei Kalfas, James Boag, Dan Brotsky Adobe Systems Incorporated, 345 Park Avenue, San Jose, USA {jtrammel,

Add to Reading List

Source URL: www.umityalcinalp.com

Language: English - Date: 2013-01-24 18:05:14
124Cryptographic protocols / Electronic commerce / X.509 / Diffie–Hellman key exchange / Public key infrastructure / Man-in-the-middle attack / Key authentication / Public key certificate / Key / Cryptography / Key management / Public-key cryptography

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-26 14:50:25
125Social engineering / Internet protocols / One-time password / Two-factor authentication / Password / Phishing / Transaction authentication number / Authentication / Man-in-the-middle attack / Security / Computer security / Cryptography

CERIAS Tech ReportDefending against Password Exposure using Deceptive Covert Communication by Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assura

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2015-02-13 13:31:35
126Cryptographic protocols / Authentication protocol / PERMIS / Authentication / Communications protocol / Data / Information / Security

Analysis and Synthesis of Authentication and Authorisation Mechanisms Against Subterfuge by Hongbin Zhou, B.E., M.E.

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2007-10-10 06:07:06
127Information / Password authentication protocol / Peer-to-peer / Cryptographic protocols / Client–server model / Password / Digital credential / Security Support Provider Interface / Internet protocols / Computing / Data

PPAA: Peer-to-Peer Anonymous Authentication Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-27 18:53:42
128Information / Reflection attack / Cryptographic nonce / Password authentication protocol / Public-key cryptography / Otway–Rees protocol / Needham–Schroeder protocol / Cryptography / Cryptographic protocols / Data

Dynamic Types for Authentication ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2009-01-08 08:47:19
129Phishing / Social engineering / Spamming / Cryptographic protocols / Cross-site scripting / Password / Two-factor authentication / Transport Layer Security / Transaction authentication number / Cybercrime / Computing / Security

Phishing with Super Bait Jeremiah Grossman WhiteHat Security Founder and Chief Technology Officer

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:35
130Computing / Cyberwarfare / Cryptographic protocols / IEEE 802.11 / Wired Equivalent Privacy / Wireless security / Lightweight Extensible Authentication Protocol / Wi-Fi Protected Access / RC4 / Cryptography / Computer network security / Wireless networking

Identifying and Responding to Wireless Attacks Chris Hurley (roamer) Contents

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:35
UPDATE