Authentication

Results: 7063



#Item
801

Arista v. Cisco Request 15 Oct 15 Authentication requested for: RFC 2401 Security Architecture for the Internet Protocol

Add to Reading List

Source URL: iaoc.ietf.org

- Date: 2015-11-01 16:21:27
    802

    Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks∗ Hassan Jameel Asghar Centre for Advanced Computing Algorithms and Cryptography Department

    Add to Reading List

    Source URL: users.monash.edu.au

    Language: English
      803

      Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken () November 12, 2015 Full disk encryption is a defensive measure in which all data stored on a physical disk or volume

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-11-13 10:32:33
        804Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Transport Layer Security / Hypertext Transfer Protocol / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

        1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

        Add to Reading List

        Source URL: www.mitls.org

        Language: English - Date: 2014-02-27 10:40:02
        805Cryptographic software / Disk encryption / Email authentication / Cryptography / PGP / TrueCrypt / Pretty Good Privacy / Encryption / BlackBerry / Email encryption / RSA Security / GPGTools

        A Worldwide Survey of Encryption Products February 11, 2016 Version 1.0

        Add to Reading List

        Source URL: www.schneier.com

        Language: English - Date: 2016-02-11 00:03:04
        806

        Keystroke Dynamics as a Biometric for Authentication Fabian Monrose Courant Institute of Mathematical Sciences, New York University, New York, NY.,

        Add to Reading List

        Source URL: avirubin.com

        Language: English - Date: 2012-11-01 14:27:11
          807

          Appeared at the 12th ACM Conference on Computer and Communications Security, NovAggregated Path Authentication for Efficient BGP Security

          Add to Reading List

          Source URL: www.ists.dartmouth.edu

          Language: English - Date: 2008-09-11 13:38:52
            808Computer security / Computer access control / Security / Federated identity / Access control / Authentication / Notary / Packaging / Biometrics / Cryptographic protocol / Identity management / Password

            Abstract Identity Management through Privacy-Preserving Authentication Ewa Syta Yale University

            Add to Reading List

            Source URL: ewa.syta.us

            Language: English - Date: 2016-04-16 15:06:35
            809Certificate authorities / Computer access control / Key management / Public-key cryptography / Transport Layer Security / Public key infrastructure / Authentication / Digital identity / Society for Worldwide Interbank Financial Telecommunication / IdenTrust / Identity theft / Entrust

            i2i Karen Wendel Karen Wendel has more than 20 years of experience in financial services, applications development

            Add to Reading List

            Source URL: www.identrust.com

            Language: English - Date: 2012-07-10 20:41:43
            810

            Samsung SDS America Biometric Solution Authentication at the biological level By 2020, new biometric

            Add to Reading List

            Source URL: i.crn.com

            Language: English - Date: 2016-03-08 10:53:30
              UPDATE