Challenge-response authentication

Results: 139



#Item
41Computer security / MS-CHAP / LM hash / Point-to-Point Tunneling Protocol / Password / Authentication protocol / Challenge-response authentication / NTLM / Cryptographic hash function / Cryptography / Computing / Internet protocols

Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Bruce Schneier Mudge Counterpane Systems L0pht Heavy Industries

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
42Password / Computer crimes / GrIDsure / Personal identification number / Keystroke logging / Challenge-response authentication / Transaction authentication number / Password cracking / Password strength / Security / Computer security / Access control

The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs Patrick Gage Kelley*, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Tim Vidas, Lujo Bauer, Nicolas Ch

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-11-20 15:29:50
43Keystroke logging / Spyware / Surveillance / Challenge-response authentication / Cryptanalysis / Authentication / Security / Cryptography / Espionage

Cryptanalysis of a Cognitive Authentication Scheme Philippe Golle, PARC David Wagner, UC Berkeley Problem Statement

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
44Internet protocols / Challenge-response authentication / Authentication / Password authentication protocol / Password / Security / Cryptography / Computer security

Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) Philippe Golle Palo Alto Research Center [removed]

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-03-09 13:40:40
45Cryptographic software / Secure Shell / OpenSSH / Password / Challenge-response authentication / Internet protocols / Internet standards / Computer network security / Ssh-keygen / System software / Software / Computing

The paper begins on the next page. Before you begin reading, we have a request... Please Help Make This Study Better. Take Part by Contributing Data! The data in our study is collected by a script that has been carefully

Add to Reading List

Source URL: nms.csail.mit.edu

Language: English - Date: 2005-06-21 15:53:34
46Speaker recognition / Keystroke dynamics / Authentication / Password / Multi-factor authentication / Challenge-response authentication / One-time password / Finger vein recognition / Biometrics Institute / Security / Biometrics / Access control

Myths and Misunderstandings about Speaker Authentication A white paper by Dr. Judith A. Markowitz, president J. Markowitz, Consultants Introduction Speaker authentication is a biometric technology that uses the acoustic

Add to Reading List

Source URL: www.jmarkowitz.com

Language: English - Date: 2010-06-09 15:30:54
47Cyberwarfare / Kerberos / Ticket / Challenge-response authentication / Alice and Bob / Key distribution center / Public-key cryptography / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Cryptography / Computer network security / Cryptographic protocols

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2005-12-06 23:10:45
48Cryptographic protocols / HTTP / Internet protocols / Internet standards / Basic access authentication / Cryptographic nonce / Challenge-response authentication / Transport Layer Security / One-time password / Computing / Security / Data

Internet Engineering Task Force (IETF) Request for Comments: 7486 Category: Experimental ISSN: [removed]S. Farrell

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-03-10 20:46:32
49Cryptography / Challenge-response authentication / Password / Oracle Database / Computer network security / Internet protocols / Kerberos / Password authentication protocol / Cryptographic protocols / Computing / Data

Oracle authentication László Tóth [removed] Disclaimer

Add to Reading List

Source URL: soonerorlater.hu

Language: English - Date: 2010-03-21 10:35:17
50Password / Cryptographic protocols / One-time password / Authentication / Cryptographic software / Challenge-response authentication / Password-authenticated key agreement / Security / Cryptography / Computer security

Secure (One-Time-) Password Authentication for the Globus Toolkit Olivier Chevassut (Lawrence Berkeley National Laboratory) Frank Siebenlist

Add to Reading List

Source URL: toolkit.globus.org

Language: English - Date: 2006-04-13 14:21:19
UPDATE