First Page | Document Content | |
---|---|---|
![]() Date: 2007-02-28 13:20:41ElGamal encryption Ciphertext Challenge-response authentication Online Certificate Status Protocol Cramer–Shoup cryptosystem Index of cryptography articles Cryptography Public-key cryptography RSA | Add to Reading List |
![]() | 1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡DocID: 1xUUI - View Document |
![]() | YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X LoginDocID: 1o9AS - View Document |
![]() | Three-factor user authentication method using biometrics challenge response Haruhiko Fujii, Yukio Tsuruoka Nippon Telegraph and Telephone Corporation {fujii.haruhiko, tsuruoka.yukio}@lab.ntt.co.jp Abstract: We propose aDocID: 1lxXl - View Document |
![]() | Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David WagnerDocID: 1fJRY - View Document |
![]() | draft-melnikov-httpbis-scram-auth-01 - Salted Challenge Response …SCRAM— HTTP Authentication MechanismDocID: 1e7OC - View Document |