Key authentication

Results: 993



#Item
321Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Multi-party Off-the-Record Messaging Ian Goldberg ˘ Berkant Ustaoglu

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-08-01 14:09:59
322RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
323Computing / Message authentication codes / Password / Ciphertext / Key / Block cipher / Crypt / Secure communication / Transport Layer Security / Cryptography / Cryptographic protocols / Security

CS255: Cryptography and Computer Security Winter 2005 Programming Project #1 Due: Monday, February 7th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-27 23:01:12
324Computer security / Computer network security / Security service / Non-repudiation / Public key infrastructure / Deniable authentication / Plausible deniability / Key-agreement protocol / Information security / Cryptography / Public-key cryptography / Cryptographic protocols

Cryptography and Evidence Michael Roe Clare College A dissertation submitted for the degree of Doctor of Philosophy in the University of Cambridge

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 1999-08-17 09:51:55
325Escrow / Real property law / Digital signature / Authentication / Cryptography / Public-key cryptography / Notary

CS255 Programming Project: The Authenticator The project focuses on Anonymous Authentication. Our objective is to enable a person to authenticate himself to a service without revealing his identity. For example, the Wal

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 1999-02-20 01:28:07
326Malware / Cryptography / Backdoor / Rootkits / Spyware / Password / One-time password / SecurID / Security / Cyberwarfare / Computer security

A Framework to Eliminate Backdoors from Response-Computable Authentication Shuaifu Dai1 , Tao Wei1,2∗ , Chao Zhang1 , Tielei Wang3 , Yu Ding1 , Zhenkai Liang4 , Wei Zou1 1 Beijing Key Lab of Internet Security Technolo

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
327Wireless networking / IEEE 802.11 / IEEE 802.1X / Wireless LAN / EAP-SIM / Nmap / Cracking of wireless networks / ProCurve Products / Software / Computing / Computer network security

KEY BENEFITS: Radio certification obtained for legal operation of nMAP on aircraft Client roaming support between nMAPs End to end network security with latest 802.1x authentication, WPA2 or WPA

Add to Reading List

Source URL: mymiltope.com

Language: English - Date: 2014-10-24 11:45:10
328Computing / Telecommunications engineering / IEEE 802.1X / Extensible Authentication Protocol / IEEE 802.11 / Wireless LAN / Wi-Fi / ARINC / IEEE 802 / Wireless networking / Computer network security / Technology

KEY BENEFITS: Global regulatory approvals (radio certification) obtained for legal operation of TWLU on aircraft End to end network security with latest 802.1x authentication, WPA2, WPA, & WEP Associates with any IEEE

Add to Reading List

Source URL: mymiltope.com

Language: English - Date: 2014-10-24 11:45:10
329Password / Message authentication code / Key / Crypt / Computer network security / Transport Layer Security / Secure Shell / Cryptography / Cryptographic protocols / Security

CS255: Cryptography and Computer Security Winter 2006 Programming Project #1 Due: Friday, February 10th, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-01 12:20:25
330Computer security / Cyberwarfare / Wireless security / IEEE 802.1X / Wireless LAN / Wi-Fi / RADIUS / Extensible Authentication Protocol / Wi-Fi Protected Access / Computer network security / Computing / Wireless networking

Dynamic PSK ™ Encryption Key Technology

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:23:01
UPDATE