Key authentication

Results: 993



#Item
151Cryptographic software / Email authentication / Email encryption / Encryption / Key disclosure law / Tor / Data security / Telecommunications data retention / Secure communication / Cryptography / Internet privacy / Public-key cryptography

Securing Safe Spaces Online Encryption, online anonymity, and human rights Contents

Add to Reading List

Source URL: hrp.law.harvard.edu

Language: English - Date: 2015-06-16 21:46:00
152Identity management / Key management / Federated identity / Public key certificate / Security Assertion Markup Language / Security token / Shibboleth / Self-signed certificate / Authentication / Cryptography / Security / Public-key cryptography

A Guided Tour of SAFE GENI 1 Jeff Chase and Vamsidhar Thummala Technical Report CS

Add to Reading List

Source URL: www.cs.duke.edu

Language: English - Date: 2014-09-03 20:52:26
153

Authentication and Key Agreement via Memorable Password Taekyoung Kwon University of California, Berkeley or Updated on August 20, 2000

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2000-08-23 06:08:21
    154

    Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models∗ Moni Naor† Gil Segev‡

    Add to Reading List

    Source URL: www.wisdom.weizmann.ac.il

    Language: English - Date: 2007-10-15 13:43:40
      155Security token / Certificate authority / Public key certificate / Smart card / Universal Serial Bus / Digital signature / Digital ID / Two-factor authentication / Public key infrastructure / Cryptography / Public-key cryptography / Key management

      Office of Controller of Certification Rajan Raj Pant Controller Government of Nepal

      Add to Reading List

      Source URL: www.cca.gov.np

      Language: English - Date: 2014-06-01 07:03:56
      156Federated identity / Single sign-on / HTTP cookie / Access token / Central Authentication Service / Identity management / Computer security / System software / Computing

      Implementation Guide Introduction This guide discusses the process and key topics involved in launching a video site on the Waywire platform.

      Add to Reading List

      Source URL: enterprise.waywire.com

      Language: English - Date: 2015-03-16 15:20:36
      157Digital signature / Public key certificate / Public key infrastructure / Authentication / Records management / Certificate authority / Cryptographic protocol / Digital Postmarks / Trusted timestamping / Cryptography / Public-key cryptography / Key management

      時刻認証基盤ガイドライン

      Add to Reading List

      Source URL: www.dekyo.or.jp

      Language: English - Date: 2015-06-17 21:01:44
      158Identity / Federated identity / Access control / Security Assertion Markup Language / Shibboleth / Single sign-on / Public key certificate / Information security / Authentication / Security / Identity management / Computer security

      Federation Member Declaration

      Add to Reading List

      Source URL: www.publishingtechnology.com

      Language: English - Date: 2014-07-23 10:57:36
      159Finite fields / Key management / Public-key cryptography / Advantage / CBC-MAC / CMAC / Block cipher / Cipher / Key size / Cryptography / Message authentication codes / Block cipher modes of operation

      Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department, UC San Diego 9500 Gilman Drive, MC-0114 La Jolla, California, USA

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2002-12-02 19:59:21
      160Key / Probabilistic encryption / Symmetric-key algorithm / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography

      Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea

      Add to Reading List

      Source URL: www.zurich.ibm.com

      Language: English - Date: 2005-09-02 12:11:39
      UPDATE