Key authentication

Results: 993



#Item
191Data / Public-key cryptography / Frame / IEEE 802.11 / Digital signature / Wireless security / Channel / Information / Cryptography / Computing

Enhanced Wireless Channel Authentication Using Time-Synched Link Signature Yao Liu, Peng Ning North Carolina State University, Raleigh, NC 27695 {yliu20, pning}@ncsu.edu Abstract— Wireless link signature is a physical

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-01-11 15:25:46
192Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / RSA / Otway–Rees protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Authenticity by Tagging and Typing ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Università Ca’Foscari di Venezia

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:43:38
193Electronic commerce / Certificate authorities / Comodo Group / Key management / Identity management / Identity theft / Identity assurance / Authentication / Online shopping / Cryptography / Security / Identity

Identity & Trust Assurance Market Analysis The next generation technologies to Create Trust Online Identity & Trust Assurance Market Analysis

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2014-02-03 11:07:19
194Access control / Identity management / Computer security / Simple public key infrastructure / PERMIS / Authentication / Filesystem permissions / KB / Public key certificate / Cryptography / Key management / Public-key cryptography

Authorisation Subterfuge by Delegation in Decentralised Networks Simon Foley and Hongbin Zhou Department of Computer Science, University College, Cork, Ireland. ,

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2005-06-02 09:03:03
195Computing / Kerberos / Generic Security Services Application Program Interface / Key distribution center / Single sign-on / Ticket / Integrated Windows Authentication / Computer network security / Computer security / Cyberwarfare

Kerberos Tutorial for Best Practices Workshop 2007

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-05-09 10:31:50
196Computer security / Password / SPEKE / Salt / Key-agreement protocol / Replay attack / Password-authenticated key agreement / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Security

Authentication and Key Agreement via Memorable Password Taekyoung Kwon Abstract them, the knowledge-based scheme is aimed for

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:20:35
197Network protocols / Internet protocols / Secure multicast / Data transmission / IP multicast / Transmission Control Protocol / Public-key cryptography / Message authentication code / Communications protocol / Data / Information / Network architecture

Efficient and Secure Source Authentication for Multicast Adrian Perrig  Ran Canetti

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:22:53
198Computer security / Kerberos / Key distribution center / Single sign-on / Ticket Granting Ticket / Ticket / Authentication server / Authentication / Server Message Block / Computer network security / Cryptography / Computing

NIST PKI06: Integrating PKI and Kerberos

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-04-24 17:53:50
199HMAC / Transmission Control Protocol / SCADA / Public-key cryptography / Block cipher modes of operation / Key / Cipher / Cryptography / Message authentication codes / Hashing

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
200Computing / Wireless networking / Information theory / ANT / Sensor node / Public-key cryptography / Transmission Control Protocol / Channel / Communications protocol / Wireless sensor network / Telecommunications engineering / Technology

Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks Ronghua Wang, Wenliang Du ∗ Department of EECS Syracuse University {rwang01, wedu}@ecs.syr.edu

Add to Reading List

Source URL: www.cis.syr.edu

Language: English - Date: 2007-06-08 22:24:12
UPDATE