Authentication

Results: 7063



#Item
931

Energy Efficient Memory Authentication Mechanism in Embedded Systems Satyajeet Nimgaonkar Mahadevan Gomathisankaran

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-08 08:09:36
    932Secure communication / Cryptographic protocols / Internet Standards / Computer network security / Transport Layer Security / HTTPS / OpenSSL / Cipher suite / Handshaking / End-to-end encryption / Middlebox / Extensible Authentication Protocol

    Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2015-07-29 16:55:02
    933Cryptography / Public-key cryptography / Key management / Internet protocols / Internet Standards / Cryptographic protocols / Named data networking / Authentication / Domain Name System Security Extensions / Key / Unique key / Transport Layer Security

    Schematizing Trust in Named Data Networking Yingdi Yu Alexander Afanasyev UCLA

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:57
    934

    NONPROFIT ORGANIZATION JUMING CULTURE & EDUCATION FOUNDATION 2015 AUTHENTICATION REQUEST OF THREE-DIMENSIONAL WORKS The following checklist is to help owners seeking authentication of works owned complete step by step th

    Add to Reading List

    Source URL: www.juming.org.tw

    Language: English - Date: 2015-07-07 01:01:50
      935

      SOLUTION BRIEF authentication in the internet banking environment:

      Add to Reading List

      Source URL: www.ca.com

      Language: English - Date: 2013-04-25 06:23:25
        936Wireless networking / Cryptographic protocols / Computer access control / Computer network security / Authentication protocol / Mutual authentication / Digest access authentication / Extensible Authentication Protocol / Authentication / Man-in-the-middle attack

        Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

        Add to Reading List

        Source URL: asokan.org

        Language: English - Date: 2015-04-08 16:31:41
        937

        Multi-Factor Authentication for More Resilient Distributed Storage in Wireless Networks [Technical Report] Scott Bell Eugene Vasserman

        Add to Reading List

        Source URL: people.cis.ksu.edu

        Language: English - Date: 2013-03-05 20:19:29
          938

          Proactive Two-Party Signatures for User Authentication Antonio Nicolosi, Maxwell Krohn, Yevgeniy Dodis, and David Mazi`eres NYU Department of Computer Science {nicolosi,max,dodis,dm}@cs.nyu.edu Abstract We study proactiv

          Add to Reading List

          Source URL: www.cs.stevens.edu

          Language: English - Date: 2010-03-09 16:23:49
            939

            1 Adaptive Message Authentication for Multi-Hop Networks Nikodin Ristanovic1 , Panos Papadimitratos2 , George Theodorakopoulos1 , Jean-Pierre Hubaux1 and Jean-Yves Le Boudec1

            Add to Reading List

            Source URL: users.cs.cf.ac.uk

            Language: English - Date: 2012-09-20 10:46:31
              940

              Will two-photon lithography become a valuable tool against product counterfeiting? Security features that enable the authentication of products and deter product imitators will be more and more important for a variety of

              Add to Reading List

              Source URL: www.nanoprecision-3d.com

              Language: English - Date: 2015-09-18 02:08:43
                UPDATE