Key authentication

Results: 993



#Item
351Technology / Human–computer interaction / Identification / Wireless / HMAC / Stream cipher / Electronic Product Code / Cryptography / Symmetric-key algorithm / Message authentication codes / Radio-frequency identification / Automatic identification and data capture

Open problems pertaining to RFID anti-cloning and some observations Benjamin Arazi Dept. of Computer Engineering and Computer Science University of Louisville Louisville, KY 40292

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-03-26 14:09:34
352Data / Email / Anonymity / Public-key cryptography / Attribution / Communications protocol / Authentication / Internet privacy / Journalism sourcing / Computing / Social psychology / Information

Attribution Requirements for the Next Generation Internet Jeffrey Hunker Carrie Gates Matt Bishop

Add to Reading List

Source URL: nob.cs.ucdavis.edu

Language: English - Date: 2013-08-09 18:09:40
353Cryptographic protocols / Electronic commerce / Certificate policy / PKCS / X.509 / S/MIME / Windows / Key / Public key certificate / Cryptography / Public-key cryptography / Key management

DAS adds role-based authentication and ‘community of interest’ confidentiality to all X.509-based security-enabled applications OVERVIEW ISC’s Document Access Servlet (DAS) is a customer-hosted web service that per

Add to Reading List

Source URL: www.infoseccorp.com

Language: English - Date: 2013-07-26 13:46:04
354Computer crimes / Password / Passphrase / Keystroke logging / Crypt / Brute-force attack / Key derivation function / Transaction authentication number / Phishing / Cryptography / Security / Computer security

Proc. HotSec ’07 Do Strong Web Passwords Accomplish Anything? Dinei Florencio,

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-11-29 12:03:58
355Cryptography / Identification / Fingerprint / Fingers / Human anatomy / Public key fingerprint / Authentication / Fingerprint Verification Competition / Fingerprints / Security / Biometrics

INTERNET TRANSACTION SECURITY WITH FINGERPRINT RECOGNITION Sagar Nilesh Shah, Kannan Chandrasegaran, Saurabh Swarup & Shrikant Patnaik Supervised By - Prof. Cunsheng Ding (CSE) & Prof. Bing Zeng (ECE) Project Overview

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2012-08-24 04:50:26
356Notary / Electronic commerce / Digital signature / Electronic signature / Non-repudiation / Public key certificate / Certificate authority / Authentication / Electronic business / Cryptography / Public-key cryptography / Key management

Business Issues in the implementation of Digital signatures E-Lock

Add to Reading List

Source URL: www.elock.com

Language: English
357Computing / Kerberos / Ticket Granting Ticket / Single sign-on / Key distribution center / Ticket / Authentication protocol / Passwd / Authentication / Computer network security / Cryptography / Computer security

Kerberos in an ISP environment UNIX/Win2K/Cisco > Nicolas FISCHBACH [removed] - http://www.securite.org/nico/ > Sébastien LACOSTE-SERIS

Add to Reading List

Source URL: www.securite.org

Language: English - Date: 2001-05-10 11:35:55
358Computer network security / Information / Tunneling protocols / Internet protocols / Internet privacy / IPsec / Virtual private network / Two-factor authentication / Internet Key Exchange / Cryptographic protocols / Computing / Data

Mobile Security DigiSAFE MobileCrypt VPN Features and Benefits Secure Connection

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 02:03:57
359Information / Internet Key Exchange / IPsec / Internet Security Association and Key Management Protocol / Security association / Oakley protocol / Internet security / Extensible Authentication Protocol / NAT traversal / Cryptographic protocols / Cryptography / Data

Fusion Embedded™ IKE Fusion Internet Key Exchange is an Internet Protocol security (IPsec) standard protocol used to ensure security for VPN negotiation and remote host or network access. It provides an automatic means

Add to Reading List

Source URL: www.unicoi.com

Language: English - Date: 2013-12-06 14:49:14
360Committees / Consultative Committee for Space Data Systems / Cryptographic hash functions / Key size / Galois/Counter Mode / Advanced Encryption Standard / Block cipher / National Security Agency / SHA-1 / Cryptography / Message authentication codes / CCSDS

Report Concerning Space Data System Standards CCSDS CRYPTOGRAPHIC ALGORITHMS INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2014-12-18 16:46:56
UPDATE