Authentication protocols

Results: 771



#Item
5413-D Secure / Data / Information / Authentication / Chargeback / 3D / Smart card / Cryptographic protocols / Merchant services / Security

September 26, 2011 Private and Confidential Agenda •

Add to Reading List

Source URL: chicagofed.org

Language: English - Date: 2011-10-03 15:06:04
542Computing / Password / SPEKE / Zero-knowledge password proof / Knowledge-based authentication / Passwd / Man-in-the-middle attack / Shadow password / Transport Layer Security / Cryptographic protocols / Cryptography / Security

Methods for Knowledge-Based Authentication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
543Comodo Group / Public-key cryptography / Key management / S/MIME / Certificate signing request / Comodo / Two-factor authentication / Revocation list / Password / Cryptography / Certificate authorities / Cryptographic protocols

Comodo Certificate Manager Software Version 4.4 SMIME Enroll API Guide Version[removed]

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2014-04-22 12:15:24
544Computer network security / Internet protocols / Wireless networking / Cryptographic protocols / Extensible Authentication Protocol / Security token / IEEE 802.1X / EAP-SIM / Authentication / Computer security / Computing / Security

An Industry Roadmap for Open Strong Authentication Initiative for Open Authentication An Industry Roadmap for Open Strong Authentication CONTENTS

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:56
545Internet protocols / Identity / Federated identity / Security token / Computer network security / RADIUS / Password authentication protocol / Authentication / Identity management / Computer security / Security / Computing

OATH Reference Architecture Release 1.0 Initiative for Open AuTHentication (OATH) OATH Reference Architecture Release 1.0 CONTENTS

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:29:33
546Access control / Internet protocols / Identity / Internet standards / Cryptographic protocols / Authentication / Security token / Extensible Authentication Protocol / Password authentication protocol / Computer security / Security / Computing

OATH Reference Architecture Release 1

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:30:58
547Cryptographic protocols / Internet protocols / CCM mode / Block cipher / CBC-MAC / Authenticated encryption / IPsec / Cryptographic nonce / OCB mode / Cryptography / Block cipher modes of operation / Message authentication codes

Submission to NIST: Counter with CBC-MAC (CCM) AES Mode of Operation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:54:44
548Cryptographic protocols / Block cipher / Cryptographic nonce / CBC-MAC / Cipher / Internet protocols / Galois/Counter Mode / EAX mode / Block cipher modes of operation / Cryptography / Message authentication codes

CCM Use Requirements Specification.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:56:29
549Message authentication codes / Cryptographic hash functions / HMAC / Internet protocols / HOTP / SHA-1 / MD5 / SHA-2 / Collision attack / Cryptography / Error detection and correction / Hashing

Attacks on SHA-1 Attacks on SHA-1 Initiative for Open AuTHentication

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:31:08
550HOTP / Computing / Message authentication codes / Cryptographic hash functions / One-time password / HMAC / Password / SHA-1 / Two-factor authentication / Cryptography / Internet protocols / Security

http://www.ietf.org/rfc/rfc4226.txt

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:04
UPDATE