Challenge-response authentication

Results: 139



#Item
51Ciphertext / Known-plaintext attack / Cryptographic protocols / RSA / Weak key / Kerberos / Initialization vector / Challenge-response authentication / Cryptography / Public-key cryptography / Password

© ACM, 1989. This is the authorsʼ version of the work, posted by permission of ACM. http://doi.acm.org[removed]74853 Reducing Risks from Poorly Chosen Keys T. Mark A. Lomas, Li Gong, Jerome H. Saltzery, Roger M.

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:06:38
52Data / Cryptographic protocols / Internet protocols / Digest access authentication / Request for Comments / Computer network security / Basic access authentication / Cryptographic nonce / Challenge-response authentication / Computing / HTTP / Internet

HTTP Authentication: Basic and Digest Access Authentication

Add to Reading List

Source URL: www.webdav.org

Language: English - Date: 2009-01-01 11:06:40
53Password / Key management / Challenge-response authentication / Needham–Schroeder protocol / Known-plaintext attack / Kerberos / Key / RSA / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:11:55
54Password / Cryptographic software / Phishing / S/KEY / Challenge-response authentication / GrIDsure / Password policy / OTPW / Security / Computer security / Access control

Graphical Passwords: Learning from the First Twelve Years Robert Biddle, Sonia Chiasson, P.C. van Oorschot School of Computer Science Carleton University, Ottawa, Canada

Add to Reading List

Source URL: hotsoft.carleton.ca

Language: English - Date: 2011-01-04 11:10:21
55Security / HTTP / Cryptography / Computer network security / Digest access authentication / Request for Comments / HTTP cookie / Challenge-response authentication / AKA / Cryptographic protocols / Computing / Computer security

Weaning the Web off of Session Cookies Making Digest Authentication Viable Version 1.0 Timothy D. Morgan January 26, 2010

Add to Reading List

Source URL: www.vsecurity.com

Language: English - Date: 2015-03-16 15:49:48
56Internet standards / Data / Secure communication / Internet protocols / HTTP / Transport Layer Security / HTTP Secure / Password / Challenge-response authentication / Computing / Cryptographic protocols / Internet

Programming Assignment 2 Winter 2015 CS 255: Intro to Cryptography Prof. Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-26 12:31:17
57Mental processes / Computer network security / Access control / Authentication / Notary / Packaging / Password / Challenge-response authentication / Security token / Mind / Cognitive science / Security

Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks Hristo Bojinov Daniel Sanchez, Paul Reber Stanford University Northwestern University

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-21 17:34:34
58Password / Challenge-response authentication / Rainbow table / Secure Shell / Salt / Cryptographic software / Computer network security / Password-authenticated key agreement / Security / Computer security / Cryptography

Authentication “ Wha twa sy ourus

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2006-03-20 04:01:25
59Password / Identity management / Challenge-response authentication / Newport News Public Schools / Login / Cryptographic software / Password policy / Access control / Security / Computer security

Microsoft Word - KBA-PASSWORD-My NNPS Password Self-Service Password Management Portal.docx

Add to Reading List

Source URL: sbo.nn.k12.va.us

Language: English - Date: 2013-02-07 12:42:27
60Computer network security / XKMS / Information / Cryptographic nonce / Challenge-response authentication / Replay attack / Cryptographic protocols / Cryptography / Cyberwarfare

CHAPTER 5. SECURITY CONSIDERATIONS 34 service because the Web service only knows this secret key: nonce = time + serial number + M AC(time + serial number, secret key)

Add to Reading List

Source URL: lists.w3.org

Language: English - Date: 2015-01-08 21:59:19
UPDATE