Authentication

Results: 7063



#Item
921

Africacrypt 2010, May 4, 2010 Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes ○Takenobu Seito

Add to Reading List

Source URL: 2010.africacrypt.com

Language: English - Date: 2010-05-04 02:16:50
    922

    Arista Networks Legal Request 13 April 15 This request is being made on behalf of Arista Networks Inc. by Michael J. Ballanco with the law form of Fish & Richardson P.C. for authentication of RFCs 792 and 2661for an inte

    Add to Reading List

    Source URL: iaoc.ietf.org

    - Date: 2015-07-22 07:38:27
      923

      SAS-Based Group Authentication and Key Agreement Protocols Sven Laur1? and Sylvain Pasini2?? 1 Helsinki University of Technology, Finland

      Add to Reading List

      Source URL: lepo.it.da.ut.ee

      Language: English - Date: 2007-12-10 05:34:48
        924Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / Cipher suite

        1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

        Add to Reading List

        Source URL: prosecco.gforge.inria.fr

        Language: English - Date: 2014-02-27 10:40:02
        925Cryptography / FIPS 201 / Standards / Smart cards / Computer access control / ISO standards / Ubiquitous computing / ISO/IEC / Authentication / PIV / Cryptographic protocol / Public-key cryptography

        ITL Bulletin: Improved Security and Mobility Through Updated Interfaces for PIV Cards (July 2015)

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-07-21 08:41:09
        926Economy / Financial services / Money / Online banking / Wirecard / Transaction authentication number / Deposit account / Bank / Fax

        Agreement Use of eBanking with PIN and TAN Customer number: Name and address of account holder:

        Add to Reading List

        Source URL: www.wirecardbank.com

        Language: English - Date: 2014-11-20 09:24:40
        927

        U2F Authentication Tokens FIDO compliant second factor authentication token 01010101100100101101001101110010101011010101010 Key Features

        Add to Reading List

        Source URL: www.cryptsoft.com

        Language: English - Date: 2016-02-25 10:46:48
          928

          Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits Damien Vergnaud École normale supérieure

          Add to Reading List

          Source URL: www.cryptoexperts.com

          Language: English - Date: 2015-11-13 04:48:41
            929

            Microsoft Word - Hardware Mechanisms for Memory Authentication

            Add to Reading List

            Source URL: css.csail.mit.edu

            Language: English - Date: 2016-01-29 11:49:16
              UPDATE