Authentication protocols

Results: 771



#Item
211Information / ZRTP / Man-in-the-middle attack / Key-agreement protocol / Public key fingerprint / Secure Real-time Transport Protocol / Authentication / SAS / Secure voice / Cryptographic protocols / Cryptography / Security

Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments 1. Dominik Schürmann

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-05-31 08:50:04
212Network architecture / Computer networking / Internet protocols / Network performance / Proxy server / Password / Internet standards / Basic access authentication / Transport Layer Security / Computing / Internet / Internet privacy

perdition: Mail Retrieval Proxy Horms (Simon Horman) Verge Networks – VA Linux Systems Japan, K.K. – January 2003 http://www.verge.net.au/linux/perdition/

Add to Reading List

Source URL: horms.net

Language: English - Date: 2003-01-17 01:46:41
213Computer network security / Internet protocols / Federated identity / Single sign-on / Security token / Secure Shell / Integrated Windows Authentication / Stonesoft Corporation / Virtual private network / Computer security / Computing / Security

a2cloud Solution for secured authentication and access to cloud Whitepaper Combining Modern Authentication Needs

Add to Reading List

Source URL: www.link-connect.com

Language: English - Date: 2013-07-15 09:30:37
214Spam filtering / Cryptographic protocols / Computer security / Yahoo! / Notary / DomainKeys Identified Mail / DomainKeys / Authentication / XML / Computing / Cryptography / Email authentication

DOSETA for Application Security draft -crocker-doseta-base // --mimeauth mimeauth draft-crocker-doseta-base

Add to Reading List

Source URL: trac.tools.ietf.org

Language: English - Date: 2011-03-31 06:52:00
215Key management / Deniable authentication / Ring signature / Digital signature / Authenticated encryption / Zero-knowledge proof / Proof of knowledge / Cryptography / Cryptographic protocols / Public-key cryptography

Microsoft Word - DA standarden.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 21:30:21
216Public-key cryptography / Password authentication protocol / Key-agreement protocol / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Encrypted key exchange

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-13 20:50:57
217Data / Internet protocols / Universal composability / Authentication protocol / Password authentication protocol / Radio-frequency identification / Cryptography / Cryptographic protocols / Information

Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros Department of Computer Science, Florida State University Tallahassee, Florida, FL

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-05 18:44:49
218Universal composability / Authentication protocol / Password authentication protocol / Secure multi-party computation / Integrated Windows Authentication / Authentication / Password / Man-in-the-middle attack / Kerberos / Cryptography / Cryptographic protocols / Security

Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-20 14:16:00
219Password authentication protocol / Password / Cryptographic nonce / Information / Cryptographic protocols / Security / Internet protocols / Computer security

Cryptanalysis of the Yang -Wang’s password authentication schemes Jue-Sam Chou1, Ming-De Yang2, Guey-Chuen Lee3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-23 03:33:04
220Computational hardness assumptions / Diffie–Hellman key exchange / Diffie–Hellman problem / Weil pairing / ID-based encryption / Password authentication protocol / Public-key cryptography / Boneh/Franklin scheme / Cryptography / Cryptographic protocols / Finite fields

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
UPDATE