Key authentication

Results: 993



#Item
271Public-key cryptography / Computer security / Antivirus software / Phishing / Whitelist / Blacklist / Public key certificate / Certificate authority / Transaction authentication number / Cryptography / Spamming / Key management

C:/Users/zhdong/Dropbox/Papers/SVN/certificates/ACSAC Poster/Certs_file.dvi

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2013-12-06 21:29:41
272Authentication / Notary / Packaging / Business development / Biometrics / Security / Business / Access control

Position: Status: Location Inside Sales Representative Full Time Position

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2015-03-17 09:04:36
273Network protocols / Cryptographic protocols / IPv6 / Internet Protocol / Tunneling protocols / Mobile IP / Proxy Mobile IPv6 / IPsec / Internet Key Exchange / Network architecture / Computing / Data

Child-proof Authentication for MIPv6 (CAM) Michael Roe Greg O’Shea Microsoft Research Ltd St George House, 1 Guildhall Street

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:35
274Cryptography / Identification / Fingerprint recognition / Fingerprint / Authentication / BioAPI / Public key fingerprint / Password / Private biometrics / Security / Biometrics / Fingerprints

ID Director VST May 2014.pub

Add to Reading List

Source URL: www.bio-key.com

Language: English
275Email / Internet / Public-key cryptography / Electronic documents / S/MIME / Email client / ID-based encryption / Cryptography / Computing / Email authentication

User-Level_S:MIME Encryption

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2011-05-24 15:35:31
276Fingerprints / Biometrics / Two-factor authentication / Authentication / Password / Identity theft / Security / Access control / Identification

NEWS RELEASE World Class Healthcare Technology Providers Presenting Bio-key Fingerprint Authentication at HIMSS 2014 Compliance Requirements Driving Utilization of Biometric Authentication for ePrescriptions Wall, NJ, Fe

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-02-20 10:47:38
277Semantic Web / Cryptographic protocols / Secure communication / FOAF / HTTP Secure / Transport Layer Security / Named graph / X.509 / Public key infrastructure / Cryptography / Public-key cryptography / Key management

FOAF+SSL: RESTful Authentication for the Social Web? Henry Story1 , Bruno Harbulot2 , Ian Jacobi3 , and Mike Jones2 1 2

Add to Reading List

Source URL: bblfish.net

Language: English - Date: 2010-06-27 11:37:24
278Advanced Encryption Standard / Power analysis / Side channel attack / Microcontrollers / Stream ciphers / Message authentication codes / Joint Test Action Group / Field-programmable gate array / TI MSP430 / Cryptography / Electronic engineering / Electronics

In the blink of an eye: There goes your AES key (DRAFT of 28 MaySergei Skorobogatov Christopher Woods

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-05-28 10:41:12
279Randomness / Tamper resistance / Public-key cryptography / Key size / Side channel attack / Smart card / Key generation / Challenge-response authentication / Cryptography / Key management / Physical Unclonable Function

Read-Proof Hardware from Protective Coatings Pim Tuyls, Geert-Jan Schrijen, Boris Skoric Jan van Geloven, Nynke Verhaegh, Rob Wolters Philips Research Laboratories Prof. Holstlaan 4, 5656 AA Eindhoven, The Netherlands

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:25
280Computer security / Kerberos / Authentication server / Ticket Granting Ticket / Challenge-response authentication / Authentication / Password / CAPTCHA / Key distribution center / Computer network security / Computing / Cryptography

Stayin’ Alive: Aliveness as an alternative to authentication Jonathan Anderson and Robert N M Watson University of Cambridge Computer Laboratory {jonathan.anderson,robert.watson}@cl.cam.ac.uk

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-11-30 15:52:29
UPDATE