Challenge-response authentication

Results: 139



#Item
61Information / Challenge-response authentication / Password authentication protocol / Public-key cryptography / Cryptographic nonce / Needham–Schroeder protocol / Otway–Rees protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]Environmental Requirements for Authentication Protocols Ran Canetti1 and Catherine Meadows2 and Paul Syverson2 1

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 10:13:46
62Directory services / Identity management / Password policy / Password / Novell eDirectory / Attachmate / Novell / Challenge-response authentication / Privileged password management / Access control / Security / Computer security

NetIQ Password Management Administration Guide

Add to Reading List

Source URL: www.netiq.com

Language: English - Date: 2013-11-28 05:19:33
63Password / Challenge-response authentication / Two-factor authentication / Salt / Authentication / Passphrase / Password policy / Password strength / Security / Computer security / Cryptography

Chapter 5 Authentication for People The challenge is to devise authentication methods that exploit the strengths yet accommodate the weaknesses of our human minds and bodies. Computers are great at doing cryptographic c

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-10 22:01:10
64Security / Kerberos / Authentication / Security token / Challenge-response authentication / Apple Open Directory / IEEE 802.1X / Computer security / Computing / Computer network security

Authentication, Authorization, and Permissions Guide Contents

Add to Reading List

Source URL: developer.apple.com

Language: English - Date: 2015-02-09 20:58:03
65Spamming / Computing / Internet / DomainKeys Identified Mail / Email filtering / Email spam / Challenge–response spam filtering / Email authentication / Email / Spam filtering / Computer-mediated communication

Trusted Message Delivery for SaaS-based CRM Systems Overview With Trusted Message Delivery for software-as-a-service(SaaS) CRM systems, we deploy one or more specially configured Sentrions either on your premises or in a

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-09-29 16:12:10
66Internet protocols / Internet / Internet standards / Secure communication / Password-authenticated key agreement / Password / Challenge-response authentication / Secure Shell / Transport Layer Security / Cryptographic protocols / Computing / Data

Leakage-Resilient Authenticated Key Establishment Protocols SeongHan Shin, Kazukuni Kobara, and Hideki Imai Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo[removed], Japan shinsh@

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
67Cyberwarfare / NTLM / Integrated Windows Authentication / Server Message Block / LAN Manager / Cryptographic nonce / Authentication protocol / Challenge-response authentication / Windows / Computing / Computer security / Computer network security

Understanding the Windows SMB NTLM Authentication Weak Nonce Vulnerability Hernan Ochoa

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:52:55
68Computer security / Unix / Internet protocols / Shadow password / Challenge-response authentication / Password / Access control / Security

Overview of Red Database 2.5 Roman Simakov, director of system development department RED SOFT CORPORATION About company

Add to Reading List

Source URL: www.firebirdsql.org

Language: English - Date: 2014-11-20 13:08:16
69Quantum cryptography / Quantum key distribution / Physical Unclonable Function / Quantum mechanics / Photon / Challenge-response authentication / Public-key cryptography / Quantum / Authentication / Physics / Cryptography / Quantum information science

Letter QUANTUM-SECURE AUTHENTICATION OF A PHYSICAL UNCLONABLE KEY SEBASTIANUS A. GOORDEN,1 MARCEL HORSTMANN,1,2 ALLARD P. MOSK,1 BORIS ŠKORIĆ,3 AND PEPIJN W.H. PINKSE1,*

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2014-12-18 09:21:18
70Access control / Security / Password / Challenge-response authentication / Computer security

Bureau of the Fiscal Service Printable Job Aid – Log In to OTCnet Online for the First Time Log In to OTCnet Online for the First time To log in to FMS Single Sign On (OTCnet Online) for the first time, complete the f

Add to Reading List

Source URL: www.fms.treas.gov

Language: English - Date: 2014-06-05 08:41:43
UPDATE