Authentication protocols

Results: 771



#Item
201Ubiquitous computing / Smart card / Alice and Bob / Chip and PIN / Debit card / Transaction authentication number / IP / Technology / Computing / Payment systems / Cryptographic protocols / ISO standards

Keep your enemies close Distance bounding against smartcard relay attacks Computer Laboratory Saar Drimer and Steven J. Murdoch

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:54
202Key management / Cryptographic protocols / Access control / Secure communication / Two-factor authentication / Password / Authentication / Transport Layer Security / Certificate authority / Cryptography / Security / Public-key cryptography

Usable Privacy and Security Introduction to Security January 26, 2006 Michael Reiter Notes By: Sasha Romanosky

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-01-26 22:28:13
203Cryptographic protocols / Electronic commerce / Cryptographic hash function / Key / RSA / Hash function / Secret sharing / Password / Challenge-response authentication / Cryptography / Key management / Public-key cryptography

Environmental Key Generation towards Clueless Agents James Riordan? School of Mathematics University of Minnesota Minneapolis, MN 55455

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
204Smart card / Public-key cryptography / Challenge-response authentication / Pirate decryption / Cryptography / Cryptographic protocols / Secure multi-party computation

Making Privacy-Preserving Data Mining Practical with Smartcards∗ Andrew Y. Lindell† January 20, 2009 Abstract

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
205Computer network security / Cryptographic protocols / Key management / ISO standards / Ubiquitous computing / Kerberos / Key distribution center / Smart card / Authentication / Cryptography / Security / Computer security

Security implications in Kerberos by the introduction of smart cards Nikos Mavrogiannopoulos Andreas Pashalidis

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
206Data / Internet standards / Extensible Messaging and Presence Protocol / Online chat / Digest access authentication / Simple Authentication and Security Layer / URI scheme / CRAM-MD5 / SMTP Authentication / Computing / Cryptographic protocols / Internet

XEP-0078: Non-SASL Authentication Peter Saint-Andre mailto: xmpp: https://stpeter.im

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 12:57:57
207Internet protocols / Cloud standards / OAuth / Authentication / Authorization / Identity management / Access token / SAML 2.0 / Security Assertion Markup Language / Computer security / Computing / Security

TECH 3366 THE CROSS PLATFORM AUTHENTICATION PROTOCOL VERSION 1.0

Add to Reading List

Source URL: tech.ebu.ch

Language: English - Date: 2014-10-17 00:18:29
208Archive formats / Cross-platform software / DEFLATE / Gzip / Internet protocols / Zlib / Lossless data compression / LZ77 and LZ78 / Huffman coding / Software / Data compression / Computing

The CRIME attack HTTPS:// Secure HTTP HTTPS provides: ● Confidentiality (Encryption), ● Integrity (Message Authentication Code),

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2012-09-26 10:02:07
209Cryptographic protocols / Internet protocols / Internet standards / Keystore / Public-key cryptography / Lightweight Directory Access Protocol / Authentication / Security token / Digest access authentication / Cryptography / Computing / Security

Oracle GlassFish Server Security Guide ReleaseE24940-01 February 2012

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-04-09 12:56:08
210IP / Complexity classes / Commitment scheme / Soundness / Challenge-response authentication / NP / Alice and Bob / Black box / Communications protocol / Cryptography / Cryptographic protocols / Zero-knowledge proof

Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy Vipul Goyal∗ UCLA and MSR India Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-23 06:25:21
UPDATE