Challenge-response authentication

Results: 139



#Item
21Spamming / Computing / Internet / DomainKeys Identified Mail / Email filtering / Email spam / Challenge–response spam filtering / Email authentication / Email / Spam filtering / Computer-mediated communication

Trusted Message Delivery for SaaS-based CRM Systems Overview With Trusted Message Delivery for software-as-a-service(SaaS) CRM systems, we deploy one or more specially configured Sentrions either on your premises or in a

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-09-29 16:12:10
22Multi-factor authentication / Authentication / Biometrics / Security / Access control / Two-factor authentication

NEWS RELEASE BIO-key® Introduces Adaptive Multifactor Authentication WEB-key 3.5 Supports Biometric, Prox Cards & Challenge Response Questions Wall, NJ, May 8, 2014 – BIO-key International, Inc. (OTCBB: BKYI), a leade

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-05-08 08:52:04
23Spamming / Computing / Internet / DomainKeys Identified Mail / Email filtering / Email spam / Challenge–response spam filtering / Email authentication / Email / Spam filtering / Computer-mediated communication

Trusted Message Delivery for SaaS-based CRM Systems Overview With Trusted Message Delivery for software-as-a-service(SaaS) CRM systems, we deploy one or more specially configured Sentrions either on your premises or in a

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-09-29 16:12:10
24Internet protocols / Password / Challenge-response authentication / Inter-Asterisk eXchange / MD5 / Replay attack / Man-in-the-middle attack / Computer network security / Cryptographic hash functions / Computer security / Cryptography / Cyberwarfare

iSEC Security Whitepaper IAX Voice Over-IP Security 1 Written by Zane Lackey and Himanshu Dwivedi iSEC Partners is a information security

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
25Randomness / PUF / Challenge-response authentication / Trusted Platform Module / Computer data storage / Smart card / Computer security / Authentication / VEST / Cryptography / Security / Physical Unclonable Function

Reconfigurable Physical Unclonable Functions – Enabling Technology for Tamper-Resistant Storage ˇ Klaus Kursawe∗ , Ahmad-Reza Sadeghi† , Dries Schellekens‡ , Boris Skori´ c§ and Pim Tuyls‡¶ ∗

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
26Computing / Internet / Information / Challenge-response authentication / Internet Relay Chat / Vehicle Identification Number

Conditional Purchase Orders John Kelsey3 Abstract We propose a system of commerce based on the Conditional

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
27Cryptography / Challenge-response authentication / IP / Alice and Bob / Baseband / Modulation / Channel / Distance-bounding protocol / Cryptographic protocols / Information / Data

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System ˇ Aanjhan Ranganathan1 , Nils Ole Tippenhauer1 , Boris Skori´ c2 , Dave Singel´ee3 , 1

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2013-03-16 15:45:20
28Randomness / Tamper resistance / Public-key cryptography / Key size / Side channel attack / Smart card / Key generation / Challenge-response authentication / Cryptography / Key management / Physical Unclonable Function

Read-Proof Hardware from Protective Coatings Pim Tuyls, Geert-Jan Schrijen, Boris Skoric Jan van Geloven, Nynke Verhaegh, Rob Wolters Philips Research Laboratories Prof. Holstlaan 4, 5656 AA Eindhoven, The Netherlands

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:25
29Artificial intelligence / Alan Turing / Transaction authentication number / Challenge-response authentication / Turing test / Brute-force attack / HTTP cookie / Brute-force search / Virtual Network Computing / CAPTCHA / System software / Computing

LNCSEnhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-11-28 11:08:41
30Computer security / Kerberos / Authentication server / Ticket Granting Ticket / Challenge-response authentication / Authentication / Password / CAPTCHA / Key distribution center / Computer network security / Computing / Cryptography

Stayin’ Alive: Aliveness as an alternative to authentication Jonathan Anderson and Robert N M Watson University of Cambridge Computer Laboratory {jonathan.anderson,robert.watson}@cl.cam.ac.uk

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-11-30 15:52:29
UPDATE