Key authentication

Results: 993



#Item
141Transport Layer Security / Key management / Public key infrastructure / Public-key cryptography / Certificate authority / Public key certificate / Root certificate / Extended Validation Certificate / X.509 / Online Certificate Status Protocol / Self-signed certificate / DNS-based Authentication of Named Entities

Accountable Key Infrastructure (AKI): ∗ A Proposal for a Public-Key Validation Infrastructure Tiffany Hyun-Jin Kim Lin-Shung Huang Adrian Perrig Collin Jackson Virgil Gligor CyLab / Carnegie Mellon University

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
142Cryptographic protocols / Public-key cryptography / Notary / Online chat / Internet protocols / Deniable authentication / XMPP / Off-the-Record Messaging / Authentication / Digital signature / Key exchange / Transport Layer Security

Improved Group Off-the-Record Messaging Hong Liu Eugene Y. Vasserman Nicholas Hopper

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-09-04 15:59:08
143Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:36:15
144Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic protocol

PDF Document

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:38:38
145Social networking services / Virtual communities / Public key infrastructure / Public-key cryptography / Internet privacy / Online identity / Authentication / Facebook Platform / Facebook / Tagged / Certificate authority

PDF Document

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:11
146Cryptography / Signature / Cryptography standards / Computer law / Public-key cryptography / Key management / EIDAS / Digital signature / Electronic signature / Qualified electronic signature / Advanced electronic signature / Electronic authentication

PDF Document

Add to Reading List

Source URL: opensignature.org

Language: English - Date: 2013-09-02 12:52:30
147Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Internet protocols / Certificate authority / X.509 / Public key certificate / DNS-based Authentication of Named Entities / Domain Name System Security Extensions / CA1

PDF Document

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
148Public-key cryptography / Electronic commerce / Notary / Electronic signature / Public key certificate / Information security / Digital signature / Authentication / Electronic business / Cryptography / Security / Key management

DOC Document

Add to Reading List

Source URL: www.mg.gov.pl

Language: English - Date: 2014-07-24 09:08:33
149RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
150Security / Federated identity / Security Assertion Markup Language / SAML 2.0 / Identity provider / Service provider / SAML 1.1 / Public key certificate / Authentication / Computer security / System software / Identity management

ELN-0602-v1.2 Deployment Profile for the Swedish eID Framework ELN-0602-v1.2 Version 1.2

Add to Reading List

Source URL: www.elegnamnden.se

Language: English - Date: 2015-05-20 08:15:49
UPDATE