Challengeresponse authentication

Results: 50



#Item
31Identity management / Password / Security / Social networking services / Computer access control / Twitter / Social media / Crypt / Challengeresponse authentication / Password policy / Password strength

Social Media as a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets Paul Dunphy1 , Vasilis Vlachokyriakos1 , Anja Thieme1 , James Nicholson2 , John McCarthy3 , Patrick Olivier1 1

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:54
32Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
33Computer access control / Radio electronics / Wireless / Radio-frequency identification / Automotive accessories / Authentication / Challengeresponse authentication / Remote keyless system / Keychain / Transponder / Distance-bounding protocol

Peripheral Authentication for Autonomous Vehicles Nisha Panwar Ben-Gurion University of the Negev, Israel

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:38
34Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
35Computer access control / CAPTCHA / Computer security / Computer vision / Password / Spyware / Challengeresponse authentication / Transaction authentication number / Password strength / Password cracking

Microsoft Word - soups2009-poster-abstract-template.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-15 07:10:07
36Cryptography / Computing / Cryptographic protocols / Juniper Networks / Pseudorandom number generators / Cryptographic nonce / Internet protocols / NetScreen Technologies / Challengeresponse authentication / ScreenOS / Internet Key Exchange / DiffieHellman key exchange

A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney†, Christina Garman‡, Matthew Green‡, Nadia Heninger†, Jacob Maskiewicz§, Eric Rescorla§, Hovav Shacham§, Ralf-Philipp We

Add to Reading List

Source URL: dualec.org

Language: English - Date: 2016-04-15 12:48:33
37Cryptography / Computer security / Computer access control / Public key infrastructure / Public-key cryptography / Key management / Password / Salt / Key / Kerberos / Challengeresponse authentication / Passphrase

Pico without public keys Frank Stajano1 , Bruce Christianson2 , Mark Lomas3 Graeme Jenkinson1 , Jeunese Payne1 , Max Spencer1 , Quentin Stafford-Fraser1 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 14:25:32
38Computer access control / Hypertext Transfer Protocol / Cryptographic protocols / Password / Security / Authentication / Phishing / HTTP cookie / Cryptographic nonce / Challengeresponse authentication / SQRL / HTTPS

I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-07-05 13:35:58
39Cryptography / Computer security / Computer access control / Cryptographic hash functions / Key management / Password / Security / Salt / Crypt / Passwd / Challengeresponse authentication / Key stretching

PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-12-09 05:42:43
40Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
UPDATE