Key authentication

Results: 993



#Item
111Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-09 21:16:55
112Comma-separated values / Tab key / Safari

Web Toolbox Guide for Creating Web Surveys Main web tools page: http://www.webservices.uiuc.edu Íbookmark this site 1. Click the “Login to the Toolbox” link (requires Bluestem authentication = NET ID and password) L

Add to Reading List

Source URL: cte.illinois.edu

Language: English - Date: 2008-09-24 12:01:03
113

A Modular Framework for Multi-Factor Authentication & Key Exchange Nils Fleischhacker, Mark Manulis, Amir Azodi SSR 2014@RHUL

Add to Reading List

Source URL: ssr2015.com

Language: English - Date: 2015-06-22 06:35:19
    114Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Communications protocol / Logic / Security protocol notation

    JuneEncryption as an Abstract Datatype: an extended abstract

    Add to Reading List

    Source URL: www.qatar.cmu.edu

    Language: English - Date: 2004-12-05 23:21:27
    115Computing / Cryptography / Computer network security / Computer security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol

    The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2010-06-11 08:24:10
    116Computer network security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol / AuthIP

    Microsoft PowerPoint - LinuxTag2009_Flyer_VPN_Solution.ppt [Compatibility Mode]

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2009-06-21 15:09:29
    117Cryptography / Computational complexity theory / Distance-bounding protocol / Public-key cryptography / Complexity classes / Proof of knowledge / IP / Challengeresponse authentication / NP / Digital signature / Security parameter / Negligible function

    Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:58
    118

    Africacrypt 2010, May 4, 2010 Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes ○Takenobu Seito

    Add to Reading List

    Source URL: 2010.africacrypt.com

    Language: English - Date: 2010-05-04 02:16:50
      119

      SAS-Based Group Authentication and Key Agreement Protocols Sven Laur1? and Sylvain Pasini2?? 1 Helsinki University of Technology, Finland

      Add to Reading List

      Source URL: lepo.it.da.ut.ee

      Language: English - Date: 2007-12-10 05:34:48
        120Cryptography / FIPS 201 / Standards / Smart cards / Computer access control / ISO standards / Ubiquitous computing / ISO/IEC / Authentication / PIV / Cryptographic protocol / Public-key cryptography

        ITL Bulletin: Improved Security and Mobility Through Updated Interfaces for PIV Cards (July 2015)

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-07-21 08:41:09
        UPDATE