Key authentication

Results: 993



#Item
211Distributed data storage / Cryptographic hash function / Wireless sensor network / Denial-of-service attack / Man-in-the-middle attack / Onion routing / Cryptography / Public-key cryptography / Message authentication code

Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗ Peng Ning†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
212Cryptographic protocols / Internet privacy / Secure communication / .onion / Transport Layer Security / Certificate authority / Tor / Web of trust / HTTP Secure / Cryptography / Public-key cryptography / Key management

Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication Paul Syverson Griffin Boyce

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:01:25
213Computer security / Internet / Email authentication / Public-key cryptography / PGP / Pretty Good Privacy / Email / Cincinnatus / Encryption / Cryptography / Internet privacy / Cryptographic software

Metropolitan Books Henry Holt and Company, LLC Publishers sinceFifth Avenue New York, New Yorkwww.henryholt.com

Add to Reading List

Source URL: us.macmillan.com

Language: English - Date: 2015-04-28 11:19:09
214Certificate policy / Public key certificate / Revocation list / Online Certificate Status Protocol / Certificate authority / Authentication / Certificate server / X.509 / Cryptography / Public-key cryptography / Key management

BR v. 1.2.5 Mapped to BR v. 1.3.0 (RFC 3647 BR v.1.2 Title BR v.1.3

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2015-05-05 18:14:23
215Password / SMS / Authentication / USB flash drive / Proxy server / Computer keyboard / Security token / Two-factor authentication / Technology / Computing / Security

Yubico USB Key Authentication guide for SMS PASSCODE © SMS PASSCODE® 2014 Yubico USB Key Authentication guide for SMS PASSCODE

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-08-25 11:20:09
216Cryptography / Identification / Automated fingerprint identification / National Crime Records Bureau / Public key fingerprint / Authentication / Fingerprints / Security / Biometrics

Notice for EoI for Fingerprint Enrolment Devices CRIME AND CRIMINAL TRACKING NETWORK AND SYSTEMS (CCTNS) PROJECT

Add to Reading List

Source URL: www.ncrb.gov.in

Language: English - Date: 2012-01-12 04:00:42
217Trusted computing / Password / Public-key cryptography / Trusted Execution Technology / Information security / Access control / Disk encryption / Two-factor authentication / Security / Cryptography / Computer security

bloc marque driving trust cmjn

Add to Reading List

Source URL: www.insidesecure.com

Language: English
218Security / Cyberwarfare / Password / One-time password / Transaction authentication number / Public key certificate / Online banking / Interactive voice response / NemID / Key management / Public-key cryptography / Computer security

Generelle vilkår for certifikatindehavere

Add to Reading List

Source URL: danskebank.dk

Language: English - Date: 2012-03-31 18:05:05
219Counterfeit / Packaging / Authentication / Public key infrastructure / Cryptography / Counterfeit consumer goods / Forgery

TPR0503AX Application Note How to combat Counterfeiting using VaultIC100

Add to Reading List

Source URL: www.insidesecure.com

Language: English
220Public-key cryptography / Key / Authentication / Digital signature / Symmetric-key algorithm / Hardware random number generator / Counterfeit / Index of cryptography articles / Cryptography / Key management / Notary

Advanced security prevents counterfeit products

Add to Reading List

Source URL: www.insidesecure.com

Language: English
UPDATE