Key authentication

Results: 993



#Item
181Internet / Spamming / Electronic documents / File sharing networks / Bitcoin / Peer-to-peer computing / Public-key cryptography / Communications protocol / Peer-to-peer / Computing / Email / Computer-mediated communication

      Bitmessage: A Peer‐to‐Peer Message Authentication and Delivery System     

Add to Reading List

Source URL: www.bitmessage.org

Language: English - Date: 2013-07-30 20:37:14
182Public-key cryptography / ANT / Sensor node / Telecommunications engineering / Wireless sensor network / Technology / Computing

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG NING North Carolina State University Broadcast authentication is a fundamental security service in distributed sensor n

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:17
183Computer security / Kerberos / Authentication server / Ticket Granting Ticket / Challenge-response authentication / Authentication / Password / CAPTCHA / Key distribution center / Computer network security / Computing / Cryptography

Stayin’ Alive: Aliveness as an alternative to authentication Jonathan Anderson and Robert N M Watson University of Cambridge Computer Laboratory {jonathan.anderson,robert.watson}@cl.cam.ac.uk

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-11-30 15:52:29
184Cryptographic protocols / Electronic commerce / X.509 / Diffie–Hellman key exchange / Public key infrastructure / Man-in-the-middle attack / Key authentication / Public key certificate / Key / Cryptography / Key management / Public-key cryptography

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-26 14:50:25
185Information / Reflection attack / Cryptographic nonce / Password authentication protocol / Public-key cryptography / Otway–Rees protocol / Needham–Schroeder protocol / Cryptography / Cryptographic protocols / Data

Dynamic Types for Authentication ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2009-01-08 08:47:19
186Notary / Computer security / Man-in-the-middle attack / Secure Shell / Certificate authority / Notary public / Key authentication / Non-repudiation / Cryptography / Key management / Public-key cryptography

Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing Dan Wendlandt David G. Andersen Adrian Perrig Carnegie Mellon University Abstract

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2008-05-29 17:15:02
187Payment systems / Smart card / Public-key cryptography / Identity Cards Act / Passphrase / Authentication / EMV / Credit card fraud / Cryptography / Security / Identity document

Liberty, Security, Identity A response to the Government’s Consultation Document1 David Llewellyn-Jones http://www.flypig.co.uk/ 7th October 2002

Add to Reading List

Source URL: www.flypig.co.uk

Language: English - Date: 2015-04-13 15:49:11
188Computing / PGP / Privacy software / Public-key cryptography / Email authentication / GNU Privacy Guard / Pretty Good Privacy / Crypt / GNU Free Documentation License / Cryptography / Computer security / Cryptographic software

Replacing PGP 2.x with GnuPG This article is based on an earlier PGP 2.x/GnuPG compatability guide (http://www.toehold.com/~kyle/pgpcompat.html) written by Kyle Hasselbacher (<>). Mike Ashley (Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:34:54
189Two-factor authentication / Security token / Certificate authority / SecurID / Proxy server / Cryptography / Public-key cryptography / Key management

PorKI: Portable PKI Credentials via Proxy Certificates? Massimiliano Pala, Sara Sinclair, and Sean W. Smith Computer Science Department PKI/Trust Lab, Dartmouth College 6211 Sudikoff, Hanover, NH 03755, US

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-10-11 07:49:24
190CMAC / HMAC / Key / Authentication / Message authentication codes / Cryptography / Security

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Message Authentication —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:00
UPDATE