Key authentication

Results: 993



#Item
311Cryptographic protocols / Finite fields / Modular arithmetic / Direct Anonymous Attestation / Trusted Platform Module / Trusted Computing Group / Trusted Computing / XTR / RSA / Cryptography / Abstract algebra / Public-key cryptography

An Anonymous Authentication Scheme for Trusted Computing Platform He Ge ⋆⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-06 15:19:54
312Cryptography / Identification / Automated fingerprint identification / National Crime Records Bureau / Public key fingerprint / Authentication / Fingerprints / Security / Biometrics

Notice for EoI for Fingerprint Enrolment Devices CRIME AND CRIMINAL TRACKING NETWORK AND SYSTEMS (CCTNS) PROJECT

Add to Reading List

Source URL: ncrb.nic.in

Language: English - Date: 2012-01-12 04:00:42
313Cyberwarfare / Computing / Kerberos / Ticket Granting Ticket / Single sign-on / Authentication protocol / Key distribution center / Apple Open Directory / Computer network security / Computer security / Key management

Taming the Beast Assess Kerberos-Protected Networks Emmanuel Bouillon                           

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
314Information / Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / Burrows–Abadi–Needham logic / Communications protocol / Public-key cryptography / Transmission Control Protocol / Otway–Rees protocol / Cryptographic protocols / Data / Cryptography

A General Approach to the Verification of Cryptographic Protocols using Answer Set Programming James P. Delgrande, Torsten Grote, and Aaron Hunter School of Computing Science, Simon Fraser University,

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:50:51
315Internet privacy / Cryptographic software / Off-the-Record Messaging / Diffie–Hellman key exchange / Key exchange / Man-in-the-middle attack / Deniable authentication / Digital signature / SecureIM / Cryptography / Cryptographic protocols / Public-key cryptography

Off-the-Record Communication, or, Why Not To Use PGP Nikita Borisov UC Berkeley Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2004-12-12 23:04:41
316Control-Alt-Delete / Password / Control key / Ctrl+Alt+Del / Windows Vista / Features new to Windows XP / Graphical identification and authentication / Microsoft Windows / Computer architecture / Computing

AnswersThatWorkTM Disabling the Windows 7 Welcome Screen (enable Username + Password logon screen) How to disable the Windows 7 Welcome Screen

Add to Reading List

Source URL: www.answersthatwork.com

Language: English - Date: 2010-06-19 17:37:34
317Block cipher modes of operation / Keystream / Block cipher / Ciphertext / Symmetric-key algorithm / Authenticated encryption / Cryptographic nonce / Advanced Encryption Standard / RC4 / Cryptography / Stream ciphers / Phelix

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1 HiFn,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
318Electronic commerce / Financial cryptography / Digital credential / Credential / Electronic authentication / Digital signature / Blind signature / Cryptographic protocol / Authentication / Cryptography / Identity management / Public-key cryptography

A Technical Overview of Digital Credentials Dr. Stefan Brands Credentica February 20, 2002 Abstract

Add to Reading List

Source URL: cypherspace.org

Language: English - Date: 2007-02-16 10:07:45
319Identity / Federated identity / Access control / Security Assertion Markup Language / Shibboleth / SAML 2.0 / Single sign-on / Public key certificate / Authentication / Security / Identity management / Computer security

Microsoft Word - Benelogic_incommon_pop.docx

Add to Reading List

Source URL: www.benelogic.com

Language: English - Date: 2012-12-05 16:48:03
320PTT Bulletin Board System / Taiwanese culture

i-Key 2032 SafeNet Authentication Client 8.0 (BOCHK) 軟件安裝手冊 作業系統需求: 目錄

Add to Reading List

Source URL: online2.dg-sign.com

Language: English - Date: 2014-11-16 23:05:07
UPDATE