Challenge-response authentication

Results: 139



#Item
11  Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-02-22 02:35:33
2YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response  YubiKey Mac OS X Login

YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X Login

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-04-12 12:42:03
3Three-factor user authentication method using biometrics challenge response Haruhiko Fujii, Yukio Tsuruoka Nippon Telegraph and Telephone Corporation {fujii.haruhiko, tsuruoka.yukio}@lab.ntt.co.jp Abstract: We propose a

Three-factor user authentication method using biometrics challenge response Haruhiko Fujii, Yukio Tsuruoka Nippon Telegraph and Telephone Corporation {fujii.haruhiko, tsuruoka.yukio}@lab.ntt.co.jp Abstract: We propose a

Add to Reading List

Source URL: fc13.ifca.ai

Language: English - Date: 2013-03-27 20:42:00
    4Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar  David Wagner

    Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

    Add to Reading List

    Source URL: naveen.ksastry.com

    Language: English - Date: 2013-06-08 15:25:49
    5draft-melnikov-httpbis-scram-auth-01 - Salted Challenge Response …SCRAM— HTTP Authentication Mechanism

    draft-melnikov-httpbis-scram-auth-01 - Salted Challenge Response …SCRAM— HTTP Authentication Mechanism

    Add to Reading List

    Source URL: tools.ietf.org

    Language: English - Date: 2015-06-03 22:29:31
      62013 IEEE Symposium on Security and Privacy  PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

      2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2013-04-05 19:56:34
      7A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

      A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2012-06-05 18:18:00
      8Proc.  WWW 2007, Banff, BC A Large-Scale Study of Web Password Habits Dinei Florencio

      Proc. WWW 2007, Banff, BC A Large-Scale Study of Web Password Habits Dinei Florencio

      Add to Reading List

      Source URL: cyberside.planet.ee

      Language: English - Date: 2013-11-03 21:52:06
      9CHAPTER  3 Protocols It is impossible to foresee the consequences of being clever.

      CHAPTER 3 Protocols It is impossible to foresee the consequences of being clever.

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2011-12-05 05:22:54
      10This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

      This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2011-07-10 02:35:13