Authentication protocols

Results: 771



#Item
171Computational complexity theory / Zero-knowledge proof / Proof of knowledge / IP / Soundness / NP / Quadratic residue / Probabilistic method / Mathematical proof / Theoretical computer science / Cryptography / Cryptographic protocols

Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-04-05 00:17:40
172Network protocols / Internet standards / Wireless networking / Electric power / Channel access method / Media Access Control / Power line communication / Smart grid / Telecommunication / Technology / Computing / Electronic engineering

MA Armature current limiters 435 ASIA (authentication, session invocation, authorization) 448–452 proxy mode 450–451

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-28 16:19:36
173Authentication / HTTP / Internet protocols / Microsoft Open Specification Promise / Cryptography / Security / Universal Serial Bus

USB CSM-1 Basic Authentication Protocol, Revision 1.0 Universal Serial Bus Content Security Method 1 Basic Authentication Protocol

Add to Reading List

Source URL: www.usb.org

Language: English - Date: 2013-12-17 20:12:51
174Internet protocols / One-time password / Two-factor authentication / HOTP / Password / SecurID / Secure Shell / Authentication / Security token / Security / Cryptography / Computer security

Version 1.0 Cornelius Kölbel () MayCC BY-NC-SA 4.0) Everybody knows that a password - be it simple or even complex - is a potential vulnerability. Two factor authentication is the way to authen

Add to Reading List

Source URL: www.linuxtag.org

Language: English - Date: 2014-05-10 10:33:00
175HMAC / Cryptographic hash function / Internet protocols / Cryptographic protocols / Key / FIPS 140-2 / Cryptography standards / SHA-2 / Cryptography / Message authentication codes / Hashing

FIPS PUB 198 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC)

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:56:45
176OSI protocols / Extended SMTP / Simple Mail Transfer Protocol / MIME / Bounce address / SMTP Authentication / John Klensin / Local Mail Transfer Protocol / Email / Computer-mediated communication / Computing

Network Working Group Request For Comments: 1869 STD: 10 Obsoletes: 1651 Category: Standards Track

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:18:34
177Cryptographic protocols / Computing / Burrows–Abadi–Needham logic / Cryptographic nonce / Challenge-response authentication / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / Cryptography / Data / Information

Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:52:04
178Password / Authentication / Man-in-the-middle attack / Strong authentication / Cryptographic protocols / Two-factor authentication / Anakam / Cryptography / Security / Computer security

Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2010-08-18 04:12:00
179Cryptographic protocols / Cryptography / Crime prevention / National security / Internet protocols / Password / Computer security / Internet security / Authentication / Security / Computer network security / Computing

PDF Document

Add to Reading List

Source URL: internetmessagingtechnology.org

Language: English - Date: 2012-08-25 10:24:06
180Portable software / Cryptographic protocols / Online chat / Internet privacy / Cryptographic software / Off-the-Record Messaging / Authentication / Public key fingerprint / Pidgin / Software / Cryptography / Computing

A User Study of Off-the-Record Messaging Ryan Stedman Kayo Yoshida Ian Goldberg

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2008-07-15 11:07:12
UPDATE