<--- Back to Details
First PageDocument Content
Universal composability / Authentication protocol / Password authentication protocol / Secure multi-party computation / Integrated Windows Authentication / Authentication / Password / Man-in-the-middle attack / Kerberos / Cryptography / Cryptographic protocols / Security
Date: 2010-08-20 14:16:00
Universal composability
Authentication protocol
Password authentication protocol
Secure multi-party computation
Integrated Windows Authentication
Authentication
Password
Man-in-the-middle attack
Kerberos
Cryptography
Cryptographic protocols
Security

Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 346,51 KB

Share Document on Facebook

Similar Documents

Software / EMC Corporation / VMware / Computing / Proprietary software / Centralized computing / VMware Horizon View / Remote desktop

VMware Social Media Advocacy: Using the VoiceStorm Mobile App How to Get Started: Login to the mobile app with your VMware Advocacy registration username and password. The “Community Code”

DocID: 1xW18 - View Document

The Password Reset MitM Attack Nethanel Gelernter Senia Kalma, Bar Magnezi, Hen Porcilan Cyberpion, Israel

DocID: 1xVxw - View Document

Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

DocID: 1xUTK - View Document

Cryptography / Computer security / Computer access control / Password / Crypt / Salt / Rainbow table / Usability / Bcrypt / Brute-force attack / Key derivation function / Password policy

Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study

DocID: 1xUMu - View Document

Cryptography / Computer access control / Computer security / Password / Salt / Challengeresponse authentication / Crypt / Brute-force attack / Key derivation function / Passphrase / OTPW

The TypTop System: Personalized Typo-Tolerant Password Checking

DocID: 1xU3a - View Document