<--- Back to Details
First PageDocument Content
Computing / Transport Layer Security / HTTP Secure / IPsec / Public-key cryptography / Internet Key Exchange / Diffie–Hellman key exchange / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data
Date: 2009-05-04 02:53:50
Computing
Transport Layer Security
HTTP Secure
IPsec
Public-key cryptography
Internet Key Exchange
Diffie–Hellman key exchange
Password
Secure Remote Password protocol
Cryptographic protocols
Cryptography
Data

Add to Reading List

Source URL: www.daimi.au.dk

Download Document from Source Website

File Size: 93,72 KB

Share Document on Facebook

Similar Documents

Computing / Cryptography / Network architecture / Internet protocols / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / World Wide Web / Transport Layer Security / Secure Remote Password protocol / Communications protocol / HTTPS

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

DocID: 1qOsD - View Document

Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

DocID: 1oxp0 - View Document

Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

DocID: 1otDt - View Document

Computer security / Password / SPEKE / Salt / Key-agreement protocol / Replay attack / Password-authenticated key agreement / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Security

Authentication and Key Agreement via Memorable Password Taekyoung Kwon Abstract them, the knowledge-based scheme is aimed for

DocID: 184CN - View Document

IEEE P1363 / SPEKE / Secure Remote Password protocol / Encrypted key exchange / Password / PKCS / Key-agreement protocol / Key exchange / Elliptic curve cryptography / Cryptography / Cryptographic protocols / Password-authenticated key agreement

PDF Document

DocID: 17bg4 - View Document