<--- Back to Details
First PageDocument Content
Applied mathematics / Computing / Distance-bounding protocol / Complexity classes / Challenge-response authentication / Cryptography / Radio-frequency identification / IP / Security token / Cryptographic protocols / Technology / Wireless
Date: 2005-11-25 11:04:54
Applied mathematics
Computing
Distance-bounding protocol
Complexity classes
Challenge-response authentication
Cryptography
Radio-frequency identification
IP
Security token
Cryptographic protocols
Technology
Wireless

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 105,36 KB

Share Document on Facebook

Similar Documents

Internet / Computing / Cyberwarfare / Internet security / Computer network security / Internet Standards / Internet protocols / Transmission Control Protocol / Denial-of-service attack / TCP reset attack / IP address spoofing / Internet protocol suite

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

DocID: 1xUUI - View Document

Computer access control / Computer security / Cryptography / Computing / YubiKey / Pluggable authentication module / One-time password / Hash-based message authentication code / Authentication / LinOTP / HMAC-based One-time Password Algorithm

YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X Login

DocID: 1o9AS - View Document

Three-factor user authentication method using biometrics challenge response Haruhiko Fujii, Yukio Tsuruoka Nippon Telegraph and Telephone Corporation {fujii.haruhiko, tsuruoka.yukio}@lab.ntt.co.jp Abstract: We propose a

DocID: 1lxXl - View Document

Cryptography / Distance-bounding protocol / IP / NP / Alice and Bob / Formal verification / Challenge-response authentication / The Verifier / Transmission Control Protocol / Theoretical computer science / Cryptographic protocols / Applied mathematics

Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

DocID: 1fJRY - View Document

draft-melnikov-httpbis-scram-auth-01 - Salted Challenge Response …SCRAM— HTTP Authentication Mechanism

DocID: 1e7OC - View Document