Key authentication

Results: 993



#Item
121

U2F Authentication Tokens FIDO compliant second factor authentication token 01010101100100101101001101110010101011010101010 Key Features

Add to Reading List

Source URL: www.cryptsoft.com

Language: English - Date: 2016-02-25 10:46:48
    122

    Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits Damien Vergnaud École normale supérieure

    Add to Reading List

    Source URL: www.cryptoexperts.com

    Language: English - Date: 2015-11-13 04:48:41
      123Cryptography / Public-key cryptography / Key management / Internet protocols / Internet Standards / Cryptographic protocols / Named data networking / Authentication / Domain Name System Security Extensions / Key / Unique key / Transport Layer Security

      Schematizing Trust in Named Data Networking Yingdi Yu Alexander Afanasyev UCLA

      Add to Reading List

      Source URL: conferences2.sigcomm.org

      Language: English - Date: 2015-10-01 13:18:57
      124Cryptography / FIPS 201 / Standards / Identity documents / Computer access control / Personal identification number / Smart card / Authentication / PIV / Public-key cryptography

      NIST Interagency Report 7863

      Add to Reading List

      Source URL: nvlpubs.nist.gov

      Language: English - Date: 2015-06-17 14:09:24
      125Cryptography / Computer network security / Computer security / Cyberwarfare / Kerberos / Key distribution center / Authentication protocol / Authentication / Ticket

      Stealing credentials for impersonation Emmanuel Bouillon October 29, 2010 Introduction

      Add to Reading List

      Source URL: archive.hack.lu

      Language: English - Date: 2010-10-29 15:08:35
      126Cryptography / Password / Security / Computer access control / Key / Authentication / Password Authenticated Key Exchange by Juggling / Zero-knowledge password proof

      LOGO_SECURITYANDTRUSTE_RUSH_36

      Add to Reading List

      Source URL: isc2015.item.ntnu.no

      Language: English - Date: 2015-09-19 12:51:00
      127Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security

      Interfaces for Personal Identity Verification

      Add to Reading List

      Source URL: nvlpubs.nist.gov

      Language: English - Date: 2016-02-16 14:47:45
      128Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

      The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2007-03-29 16:18:56
      129Cryptography / Key management / Public key infrastructure / Public-key cryptography / Pharmaceutical industry / E-commerce / Public key certificate / Email / Authentication / Negotiation / Validation

      Authorized Negotiator/Contract Administrator Updates Version 1.0 This document will explain the Authorized Negotiators/Contract Administrators enhancements that will be available in the November 2012 Release.

      Add to Reading List

      Source URL: eoffer.gsa.gov

      Language: English - Date: 2014-04-22 14:22:59
      130

      LNCSA Modular Framework for Multi-Factor Authentication and Key Exchange

      Add to Reading List

      Source URL: manulis.eu

      Language: English - Date: 2015-03-31 12:18:23
        UPDATE