Challenge-response authentication

Results: 139



#Item
111Password / Network Caller ID / Challenge-response authentication / Login / Identity management / Self-service password reset / Privileged password management / Access control / Security / Computer security

NCID-NG User Guide Version 1.3 Office of Information Technology Services December 20, 2010

Add to Reading List

Source URL: www.oshr.nc.gov

Language: English - Date: 2010-12-28 17:38:54
112Access control / Security / Computer security / Password / Challenge-response authentication / Online and offline

Chapter 3: Accessing and Navigating OTCnet OTCnet Participant User Guide (This page intentionally left blank)

Add to Reading List

Source URL: fms.treas.gov

Language: English - Date: 2014-06-05 08:39:17
113Security / HTTP / Cryptography / Computer network security / Digest access authentication / Request for Comments / HTTP cookie / Challenge-response authentication / AKA / Cryptographic protocols / Computing / Computer security

Weaning the Web off of Session Cookies Making Digest Authentication Viable Version 1.0 Timothy D. Morgan January 26, 2010

Add to Reading List

Source URL: www.vsecurity.com

Language: English - Date: 2010-01-26 12:58:47
114Computer security / Challenge-response authentication / Self-service password reset / Password fatigue / Password / Security / Access control

Financial Management Service Printable Job Aid – Reset Password Reset Password To reset your password, complete the following steps:

Add to Reading List

Source URL: fms.treas.gov

Language: English - Date: 2012-11-26 08:46:46
115Complexity classes / Computational complexity theory / Interactive proof system / Physical Unclonable Function / IP / Zero-knowledge proof / NP / NEXPTIME / Challenge-response authentication / Cryptography / Cryptographic protocols / Applied mathematics

Virtual Proofs of Reality Ulrich R¨uhrmair [removed] Abstract—In this paper, we discuss the question how physical statements can be proven remotely over digital communication

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-06-06 08:08:31
116Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:55
117Computer network security / Access control / Authentication / Notary / Packaging / Challenge-response authentication / Password / Security token / Sequence learning / Security / Mind / Computer security

Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks Hristo Bojinov Daniel Sanchez, Paul Reber Stanford University Northwestern University

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2012-06-19 11:56:05
118Password / Identity management / Challenge-response authentication / Newport News Public Schools / Login / Cryptographic software / Password policy / Access control / Security / Computer security

Microsoft Word - KBA-PASSWORD-My NNPS Password Self-Service Password Management Portal.docx

Add to Reading List

Source URL: www.sbo.nn.k12.va.us

Language: English - Date: 2013-02-07 12:42:27
119Password / Identity management / Challenge-response authentication / Newport News Public Schools / Login / Cryptographic software / Password policy / Access control / Security / Computer security

Microsoft Word - KBA-PASSWORD-My NNPS Password Self-Service Password Management Portal.docx

Add to Reading List

Source URL: nnadmin.sbo.nn.k12.va.us

Language: English - Date: 2013-02-07 12:42:27
120Cryptographic software / Password / Security Accounts Manager / Cryptographic hash functions / Salt / Challenge-response authentication / Shadow password / Crypt / S/KEY / Cryptography / Computer security / Security

On NT Password Security By: Jos Visser This article is (c) Copyright 1997 Open Solution Providers. It may be referred to or reproduced in full only with full retention of this copyright message. For more information on t

Add to Reading List

Source URL: www.josvisser.nl

Language: English - Date: 2004-10-07 03:31:00
UPDATE