Authentication protocols

Results: 771



#Item
51Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2016-01-06 07:34:05
52Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks∗ Hassan Jameel Asghar Centre for Advanced Computing Algorithms and Cryptography Department

Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks∗ Hassan Jameel Asghar Centre for Advanced Computing Algorithms and Cryptography Department

Add to Reading List

Source URL: users.monash.edu.au

Language: English
    531  Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2014-02-27 10:40:02
    54FIDO UAF Application API and Transport Binding Specification v1.0 FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps/fido-uaf-client-api-transport-

    FIDO UAF Application API and Transport Binding Specification v1.0 FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps/fido-uaf-client-api-transport-

    Add to Reading List

    Source URL: fidoalliance.org

    Language: English - Date: 2015-03-30 14:07:01
    55FIDO Security Reference FIDO Alliance Proposed Standard 14 May 2015 This version: https://fidoalliance.org/specs/fido-u2f-v1.0-psfido-security-ref-v1.0pshtml Previous version: http://fidoalliance.org/

    FIDO Security Reference FIDO Alliance Proposed Standard 14 May 2015 This version: https://fidoalliance.org/specs/fido-u2f-v1.0-psfido-security-ref-v1.0pshtml Previous version: http://fidoalliance.org/

    Add to Reading List

    Source URL: fidoalliance.org

    Language: English - Date: 2015-06-29 13:40:25
    56Protocols and Light-Weight Algorithms for Wireless Authentication through Side Channels in IEEECommunication

    Protocols and Light-Weight Algorithms for Wireless Authentication through Side Channels in IEEECommunication

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2010-04-20 22:15:19
      57JuneEncryption as an Abstract Datatype: an extended abstract

      JuneEncryption as an Abstract Datatype: an extended abstract

      Add to Reading List

      Source URL: www.qatar.cmu.edu

      Language: English - Date: 2004-12-05 23:21:27
      58The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

      The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

      Add to Reading List

      Source URL: www.strongswan.org

      Language: English - Date: 2010-06-11 08:24:10
      59Microsoft PowerPoint - LinuxTag2009_Flyer_VPN_Solution.ppt [Compatibility Mode]

      Microsoft PowerPoint - LinuxTag2009_Flyer_VPN_Solution.ppt [Compatibility Mode]

      Add to Reading List

      Source URL: www.strongswan.org

      Language: English - Date: 2009-06-21 15:09:29
      60Continuous Measurement Platforms can help Mitigate Pervasive Surveillance Julian Kornberger  Carsten Bormann  RAIM Workshop, Saturday, 2015–10–31, Yokohama, JP  Introduction

      Continuous Measurement Platforms can help Mitigate Pervasive Surveillance Julian Kornberger Carsten Bormann RAIM Workshop, Saturday, 2015–10–31, Yokohama, JP Introduction

      Add to Reading List

      Source URL: irtf.org

      Language: English - Date: 2016-01-05 05:04:04