Key authentication

Results: 993



#Item
361Key management / Cyberwarfare / Kerberos / Key distribution center / Single sign-on / Ticket Granting Ticket / Ticket / Authentication / Shared secret / Cryptography / Computer network security / Computer security

Cross-realm Kerberos implementations Esan Wit Esan.Wit at os3.nl Mick Pouw Mick.Pouw at os3.nl

Add to Reading List

Source URL: realm-xover.arpa2.net

Language: English - Date: 2014-10-11 16:09:30
362Internet / Message transfer agent / MX record / Anti-spam techniques / Email authentication / Email / Computer-mediated communication / Computing

An Email Signature System for Eliminating Spam Robert Rose November 9, 2004 Abstract For my project, I propose to create an email client that incorporates public key / private key encryption to digitally sign email as it

Add to Reading List

Source URL: www.robertwrose.com

Language: English
363Cryptography / Fingerprints / Fingerprint / Fingers / Human anatomy / Authentication / Public key fingerprint / Two-factor authentication / Security / Biometrics / Identification

ITU-T Workshop on Security, Seoul Importance of Open Discussion on Adversarial Analyses for Mobile Security Technologies --- A Case Study for User Identification --14 May 2002

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2003-11-20 14:39:09
364Notary / Digital signature / Electronic signature / Public key certificate / Non-repudiation / Signature / Certificate authority / Authentication / ABA digital signature guidelines / Cryptography / Public-key cryptography / Key management

Digital Signature Guidelines - Tutorial Page 1 of 7 HOME SEARCH JOIN CLE ABA STORE

Add to Reading List

Source URL: e-ammar.net

Language: English - Date: 2010-08-08 07:50:20
365Password / Cryptographic protocols / One-time password / Authentication / Cryptographic software / Challenge-response authentication / Password-authenticated key agreement / Security / Cryptography / Computer security

Secure (One-Time-) Password Authentication for the Globus Toolkit Olivier Chevassut (Lawrence Berkeley National Laboratory) Frank Siebenlist

Add to Reading List

Source URL: toolkit.globus.org

Language: English - Date: 2006-04-13 14:21:19
366Locksmithing / Authorization / Key / Authentication / Security / Pump-action shotguns / KAC Masterkey

STANLEY MASTERKEY CODE AND MASTERKEY SERVICE POLICY[removed]I. DISTRIBUTOR MASTERKEY SERVICES

Add to Reading List

Source URL: www.bestaccess.com

Language: English - Date: 2014-12-12 15:43:05
367Electronic signature / Cryptographic hash function / Hysteresis / Elliptic Curve DSA / Signature / SHA-1 / Message authentication code / RSA / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:46
368Secure communication / Computing / Electronic commerce / Transport Layer Security / Man-in-the-middle attack / HTTP Secure / Public-key cryptography / Mutual authentication / Dynamic SSL / Cryptography / Security / Cryptographic protocols

“Only one Tool in the Toolbox!” White Paper CASQUE MSC- Mutually Authenticated Secure Communications Distributed Mangement Systems Ltd, January[removed]How do you access a secure web site or setup a secure connection?

Add to Reading List

Source URL: www.casque.co.uk

Language: English - Date: 2015-01-06 05:47:43
369Certificate authorities / Comodo Group / Electronic commerce / Computer security / Public key certificate / Code signing / Comodo / S/MIME / GlobalSign / Cryptography / Key management / Public-key cryptography

Cost-Effective PKI Certificates Give IT Powerful Control over Application Usage and a Seamless Experience for End Users When Open Finance Network needed Digital Client Authentication Certificates - one for every financia

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:05
370Theoretical computer science / Applied mathematics / Error detection and correction / Quantum key distribution / Computer arithmetic / Cryptographic hash function / Hash function / Hamming / MD5 / Cryptography / Quantum information science / Quantum cryptography

3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. O

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:58:38
UPDATE