Challenge-response authentication

Results: 139



#Item
121Cryptography / Secure communication / Internet standards / Internet protocols / HTTP / Transport Layer Security / HTTP Secure / Challenge-response authentication / Public-key cryptography / Computing / Internet / Cryptographic protocols

Programming Assignment 3 Winter 2014 CS 255: Intro to Cryptography Prof. Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-03-01 03:17:18
122ElGamal encryption / Ciphertext / Challenge-response authentication / Online Certificate Status Protocol / Cramer–Shoup cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2006

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-02-28 13:20:41
123Password / Keystroke dynamics / Eye tracking / Keystroke logging / Security token / Virtual keyboard / Challenge-response authentication / Partial Password / OTPW / Human–computer interaction / Security / Computing

Microsoft Word - SOUPS[removed]Reducing Shoulder-surfing by Using Gaze-based Password Entry _final_.doc

Add to Reading List

Source URL: hci.stanford.edu

Language: English - Date: 2007-03-19 19:15:10
124Password / Challenge-response authentication / Authentication / Question / Self-service password reset / Cognitive password / Security / Cryptography / Access control

Love and Authentication Erik Stolterman Markus Jakobsson

Add to Reading List

Source URL: www.ravenwhite.com

Language: English - Date: 2012-06-18 15:18:48
125Information / Challenge-response authentication / IP / Commitment scheme / NP / Transmission Control Protocol / Communications protocol / Error detection and correction / Alice and Bob / Cryptographic protocols / Data / Cryptography

Distance Bounding in Noisy Environments Dave Singel´ee and Bart Preneel ESAT-COSIC, K.U.Leuven,

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
126Internet protocols / Wireless / Information / Security / Challenge-response authentication / Password authentication protocol / Authentication protocol / Automatic identification and data capture / Computing / Radio-frequency identification

The Swiss-Knife RFID Distance Bounding Protocol Chong Hee Kim , Gildas Avoine, Fran¸cois Koeune , Fran¸cois-Xavier

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2011-02-26 09:55:10
127Wireless / Telecommunications engineering / Automatic identification and data capture / Privacy / Radio-frequency identification / Challenge-response authentication / Distance-bounding protocol / Man-in-the-middle attack / Communications protocol / Information / Data / Cryptographic protocols

Preparation of Papers for the First EURASIP Workshop on RFID Technology

Add to Reading List

Source URL: www.eurasip.org

Language: English - Date: 2009-04-03 09:44:44
128Cryptographic protocols / HTTP / Password / Challenge-response authentication / Two-factor authentication / Security token / Digest access authentication / Cryptographic nonce / Authentication / Security / Cryptography / Computer security

CHAPTER 3

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:54
129Cryptography / MS-CHAP / Point-to-Point Tunneling Protocol / Password / Challenge-response authentication / Authentication protocol / Crypt / LM hash / NTLM / Computing / Computer security / Internet protocols

Exploiting known security holes in Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Jochen Eisinger

Add to Reading List

Source URL: penguin-breeder.org

Language: English - Date: 2003-02-21 09:40:07
130Data / Information / Communications protocol / Challenge-response authentication / Cryptography / Physical Unclonable Function / Randomness

2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:34
UPDATE