Key authentication

Results: 993



#Item
161Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
162Public-key cryptography / Computer network security / Capability-based security / Tahoe Least-Authority Filesystem / Key management / Internet privacy / Computer security / Authentication / Cloud computing / Cryptography / Security / Access control

Tamias: a privacy aware distributed storage Jean Lorchat, Cristel Pelsser, Randy Bush, Keiichi Shima Internet Initiative Japan, Inc. {jean,cristel,randy,keiichi}@iijlab.net 1

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2011-02-12 20:29:24
163Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security

FortiToken -300 TM One-Time Password Token Strong Authentication at your Fingertips The FortiToken-300 product comprises a hardware token (FortiToken-300 PKI USB

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:10
164Rekeying / Data management / Computing / Graph theory / B-tree / R-tree / Binary tree

1 Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui, and David K. Y. Yau

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2005-06-19 23:01:08
165Notary / Internet protocols / Access control / Authentication / Public key certificate / Password authentication protocol / Cryptography / Key management / Public-key cryptography

Online Certification/Authentication of Documents re: Business Entities – 201–April–05 Topic: Online Certification/Authentication of Documents re: Business Entities

Add to Reading List

Source URL: www.iaca.org

Language: English - Date: 2013-02-07 21:37:40
166Security / Cyberwarfare / FIPS 140 / Trusted Computing Group / Critical Security Parameter / Trusted Computing / Authentication / Zeroisation / Key management / Computer security / Cryptography standards / Cryptography

Microsoft Word - 22e - Security Policy APK-0.6.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:49:37
167Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security

FortiToken -300 TM One-Time Password Token Strong Authentication at your Fingertips The FortiToken-300 product comprises a hardware token (FortiToken-300 PKI USB

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:10
168Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-01-13 10:28:23
169Authentication / Notary / Packaging / Security / Access control / Identity management

One Identity Trust Framework for all Business and Personal Transactions Establishing a Key Cornerstone for Cyber Security to Achieve Trust

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2015-05-26 17:59:11
170Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2012-01-15 19:52:05
UPDATE