Key authentication

Results: 993



#Item
201Hashing / Message authentication codes / Search algorithms / Cryptographic hash function / Public-key cryptography / Random number generation / PUF / Hash function / One-way function / Cryptography / Randomness / Physical Unclonable Function

Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-13 19:26:58
202Verisign / Key management / Certificate authority / HTTP Secure / Authentication / Certisign / Security token / Cryptography / Domain name system / Radio-frequency identification

PR Newswire, Financial institutions supporting the Open Financial Exchange specification can verify the authenticity of communications and transactions with their customers using a new program announced today

Add to Reading List

Source URL: www.ofx.net

Language: English - Date: 2007-10-11 14:07:36
203Internet protocols / Data transmission / Communications protocol / Protocols / Transmission Control Protocol / IP multicast / Public-key cryptography / Message authentication code / Authentication / Cryptography / Data / Information

RSA Laboratories Volume 5, No. 2, Summer / Fall 2002 CONTENTS I.

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2013-08-15 00:54:53
204Security / Internet protocols / Internet standards / Secure communication / Man-in-the-middle attack / Public key fingerprint / Public-key cryptography / Authentication / Transport Layer Security / Cryptography / Cryptographic protocols / Computing

Talking To Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong Xerox Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CAbalfanz,smetters,stewa

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:13:47
205Data / Access control / Internet protocols / Identity management / Mobile content / Universal Plug and Play / Internet Key Exchange / IPsec / Smart card / Computing / Security / Cryptographic protocols

Inter-device Authentication and Authorization Framework: Demonstration System based on Novel Smart Card Software Manabu Hirano Department of Information and Computer Engineering Toyota National College of Technology 2-1

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2008-07-21 13:42:26
206Cryptography / Computer security / System software / Linux Unified Key Setup / Encryption / Pre-boot authentication / Array controller based encryption / FreeOTFE / Disk encryption / Cryptographic software / Software

Encryption at Rest Proven Encryption Solutions to Protect Your Noble Data An important first step in taking control of information and helping to meet regulatory requirements is encrypting your contact center’s sensiti

Add to Reading List

Source URL: www.noblesys.com

Language: English - Date: 2010-08-04 10:24:20
207Communications protocol / ANT / Key distribution / Man-in-the-middle attack / Cryptography / Public-key cryptography / Message authentication code

Practical Broadcast Authentication in Sensor Networks ∗ Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dliu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
208Special purpose file systems / Public-key cryptography / Encrypting File System / Windows / Filesystem-level encryption / Security token / File system / Key management / Password / Cryptography / Cryptographic software / Disk encryption

Zero-Interaction Authentication Mark D. Corner Brian D. Noble

Add to Reading List

Source URL: www.sigmobile.org

Language: English - Date: 2013-08-14 12:38:30
209Cyberwarfare / Key management / Kerberos / Ticket Granting Ticket / Single sign-on / Key distribution center / Ticket / Authentication server / Network File System / Computer network security / Cryptography / Computer security

Kerberos & SLURM using Auks - Tutorial - SLURM User Group Meeting 2012 | Matthieu Hautreux <>

Add to Reading List

Source URL: slurm.schedmd.com

Language: English - Date: 2012-09-26 12:56:48
210Central processing unit / Coprocessor / Two-factor authentication / Authentication / Communications protocol / Cryptography / Security / Public-key cryptography

Int J Inf Secur: 28–41 / Digital Object Identifier (DOIs10207Outbound authentication for programmable secure coprocessors Sean W. Smith Department of Computer Science, Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:39:47
UPDATE