Challenge-response authentication

Results: 139



#Item
31PUF / Scattering / Speckle pattern / Light scattering / Challenge-response authentication / Information theory / Physics / Physical Unclonable Function / Randomness

Information-Theoretic Security Analysis of Physical Uncloneable Functions  c, S. Stallinga, A.H.M. Akkermans, W. Ophey P. Tuyls, B. Skori Philips Research Laboratories, Prof. Holstlaan 4,

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:27
32Cryptographic protocols / Electronic commerce / Cryptographic hash function / Key / RSA / Hash function / Secret sharing / Password / Challenge-response authentication / Cryptography / Key management / Public-key cryptography

Environmental Key Generation towards Clueless Agents James Riordan? School of Mathematics University of Minnesota Minneapolis, MN 55455

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
33Smart card / Public-key cryptography / Challenge-response authentication / Pirate decryption / Cryptography / Cryptographic protocols / Secure multi-party computation

Making Privacy-Preserving Data Mining Practical with Smartcards∗ Andrew Y. Lindell† January 20, 2009 Abstract

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
34Unix / Cryptographic software / System administration / One-time password / Password / Security token / Two-factor authentication / Shadow password / Challenge-response authentication / Computer security / Security / Access control

One-Time Passwords Hal Pomeranz Deer Run Associates One-Time Passwords – Unix Security Track All material in this course Copyright © Hal Pomeranz and Deer Run Associates,

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2001-02-08 01:03:21
35Password / Security token / Single sign-on / Challenge-response authentication / User / Secure Shell / Cryptographic software / Password manager / OTPW / Computer security / Security / Access control

Peer-to-Peer Single Sign-On Security Scheme for Today’s Smart Spaces? Enrique Soriano Salvador Francisco J. Ballesteros Gorka Guardiola Laboratorio de Sistemas

Add to Reading List

Source URL: lsub.org

Language: English - Date: 2014-05-08 10:53:16
36IP / Complexity classes / Commitment scheme / Soundness / Challenge-response authentication / NP / Alice and Bob / Black box / Communications protocol / Cryptography / Cryptographic protocols / Zero-knowledge proof

Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy Vipul Goyal∗ UCLA and MSR India Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-23 06:25:21
37Radio / Radio-frequency identification / Information / Ultra-wideband / Challenge-response authentication / Telecommunications engineering / Technology / Distance-bounding protocol

An RFID distance bounding protocol Computer Laboratory Gerhard P. Hancke, Markus G. Kuhn Security Group / TAMPER Lab

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:54
38Password / Challenge-response authentication / Diffie–Hellman key exchange / Public-key cryptography / Password Authenticated Key Exchange by Juggling / Zero-knowledge password proof / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† † Center for Information Security Technologies (CIST), Korea Unive

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-25 07:03:53
39Password / Security / Transaction authentication number / Data / Cryptographic protocols / Computer security / Challenge-response authentication

Security Analysis of A Remote User Authentication Protocol by Liao and Wang Dang Nguyen Duc∗,a , Kwangjo Kima a Auto-ID Lab Korea, Department of Information and Communications Engineering,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-09 03:45:40
40Information / Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / Burrows–Abadi–Needham logic / Communications protocol / Public-key cryptography / Transmission Control Protocol / Otway–Rees protocol / Cryptographic protocols / Data / Cryptography

A General Approach to the Verification of Cryptographic Protocols using Answer Set Programming James P. Delgrande, Torsten Grote, and Aaron Hunter School of Computing Science, Simon Fraser University,

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:50:51
UPDATE