Authentication protocols

Results: 771



#Item
141Computer security / Password / SPEKE / Salt / Key-agreement protocol / Replay attack / Password-authenticated key agreement / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Security

Authentication and Key Agreement via Memorable Password Taekyoung Kwon Abstract them, the knowledge-based scheme is aimed for

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:20:35
142Mathematics / Prime-counting function / Cryptographic nonce / Π-calculus / Data / Cyberwarfare / Otway–Rees protocol / Cryptographic protocols / Cryptography / Reflection attack

Compositional Analysis of Authentication Protocols ? Michele Bugliesi, Riccardo Focardi, and Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy {mi

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:44:01
143Network protocols / Internet protocols / Secure multicast / Data transmission / IP multicast / Transmission Control Protocol / Public-key cryptography / Message authentication code / Communications protocol / Data / Information / Network architecture

Efficient and Secure Source Authentication for Multicast Adrian Perrig  Ran Canetti

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:22:53
144Cryptography / Technology / Cryptographic protocols / IEEE 802.11 / Extensible Authentication Protocol / Wired Equivalent Privacy / Password authentication protocol / Wireless access point / Integrated Windows Authentication / Wireless networking / Computer network security / Computing

YourWireless Network has No Clothes∗ William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2001-08-11 18:26:34
145Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Cryptographic hash function / Security token / Hash chain / Transport Layer Security / Cryptographic nonce / Computing / Cryptography / Internet

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-07-20 15:18:58
146Ubiquitous computing / Wireless / Technology / Automatic identification and data capture / Privacy / Radio-frequency identification

Passive Attacks on a Class of Authentication Protocols for RFID Basel Alomair, Loukas Lazos, and Radha Poovendran Network Security Lab. Electrical Engineering Department University of Washington

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2008-04-28 13:58:27
147Internet protocols / Data transmission / Communications protocol / Protocols / Transmission Control Protocol / IP multicast / Public-key cryptography / Message authentication code / Authentication / Cryptography / Data / Information

RSA Laboratories Volume 5, No. 2, Summer / Fall 2002 CONTENTS I.

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2013-08-15 00:54:53
148Security / Internet protocols / Internet standards / Secure communication / Man-in-the-middle attack / Public key fingerprint / Public-key cryptography / Authentication / Transport Layer Security / Cryptography / Cryptographic protocols / Computing

Talking To Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong Xerox Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CAbalfanz,smetters,stewa

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:13:47
149Data / Access control / Internet protocols / Identity management / Mobile content / Universal Plug and Play / Internet Key Exchange / IPsec / Smart card / Computing / Security / Cryptographic protocols

Inter-device Authentication and Authorization Framework: Demonstration System based on Novel Smart Card Software Manabu Hirano Department of Information and Computer Engineering Toyota National College of Technology 2-1

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2008-07-21 13:42:26
150

AUTH S CAN: Automatic Extraction of Web Authentication Protocols from Implementations∗ Guangdong Bai? , Jike Lei? , Guozhu Meng? , Sai Sathyanarayan Venkatraman? , Prateek Saxena? , Jun Sun† , Yang Liu‡ , and Jin S

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2013-04-03 03:15:17
    UPDATE