Key authentication

Results: 993



#Item
291Key / Cryptography / Message authentication code / Cryptographic hash function

Cryptographic Support for Secure Logs on Untrusted Machines Bruce Schneier John Kelsey {schneier,kelsey}@counterpane.com Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
292Cryptographic protocols / Internet protocols / Internet standards / Keystore / Public-key cryptography / Lightweight Directory Access Protocol / Authentication / Security token / Digest access authentication / Cryptography / Computing / Security

Oracle GlassFish Server Security Guide ReleaseE24940-01 February 2012

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-04-09 12:56:08
293Public key certificate / Certificate authority / Authentication / Authorization / Public key infrastructure / Cryptography / Public-key cryptography / Key management

Applications for NDN James Kasten University of Michigan Network Authentication 

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:48
294Information / ZRTP / Man-in-the-middle attack / Key-agreement protocol / Public key fingerprint / Secure Real-time Transport Protocol / Authentication / SAS / Secure voice / Cryptographic protocols / Cryptography / Security

Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments 1. Dominik Schürmann

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-05-31 08:50:04
295Cryptography / Password / One-time password / Authentication / IPAQ / S/KEY / Bluetooth / Security / Mobile computers / Technology

Loud and Clear: Human-Verifiable Authentication Based on Audio Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, and Ersin Uzun Department of Computer Science University of California, Irvine {goodrich,ms

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-28 12:55:55
296Key management / Deniable authentication / Ring signature / Digital signature / Authenticated encryption / Zero-knowledge proof / Proof of knowledge / Cryptography / Cryptographic protocols / Public-key cryptography

Microsoft Word - DA standarden.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 21:30:21
297Access control / Key management / Simple public key infrastructure / Authentication / PERMIS / Authorization / Credential / Lightweight Directory Access Protocol / Trust management / Security / Identity management / Computer security

A research and education initiative at the MIT Sloan School of Management Delegation Logic: A Logic-based Approach to Distributed Authorization Paper 115

Add to Reading List

Source URL: ebusiness.mit.edu

Language: English - Date: 2012-11-08 09:59:25
298Public-key cryptography / Password authentication protocol / Key-agreement protocol / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Encrypted key exchange

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-13 20:50:57
299Ciphertext indistinguishability / Public-key cryptography / Encryption / VMAC / Digital signature / Deterministic encryption / Advantage / Cipher / Galois/Counter Mode / Cryptography / Authenticated encryption / Message authentication code

Chapter 7 Message Authentication In most people’s minds, privacy is the goal most strongly associated to cryptography. But message authentication is arguably even more important. Indeed you may or may not care if some

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:25:35
300Data / Internet protocols / Universal composability / Authentication protocol / Password authentication protocol / Radio-frequency identification / Cryptography / Cryptographic protocols / Information

Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros Department of Computer Science, Florida State University Tallahassee, Florida, FL

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-05 18:44:49
UPDATE