Key authentication

Results: 993



#Item
371Notary / Digital signature / Key / Authentication / Lamport signature / RSA / Cryptography / Public-key cryptography / Key management

OneTouch 4.0 Scanned Documents

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-17 23:49:49
372Computing / Data security / Computer security / Crime prevention / National security / Security service / Message authentication code / Virtual private network / Public-key cryptography / Computer network security / Cryptography / Security

The use of information technology standards to secure telecommunication networks

Add to Reading List

Source URL: aic.gov.au

Language: English - Date: 2009-05-25 16:54:07
373Ciphertext / Known-plaintext attack / Cryptographic protocols / RSA / Weak key / Kerberos / Initialization vector / Challenge-response authentication / Cryptography / Public-key cryptography / Password

© ACM, 1989. This is the authorsʼ version of the work, posted by permission of ACM. http://doi.acm.org[removed]74853 Reducing Risks from Poorly Chosen Keys T. Mark A. Lomas, Li Gong, Jerome H. Saltzery, Roger M.

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:06:38
374Public-key cryptography / Internet standards / Key management / Email authentication / S/MIME / X.509 / Certificate Management Protocol / Certificate policy / Public key infrastructure / Cryptography / Computing / Cryptographic protocols

S/MIME - great idea, pity about the implementation

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:50:57
375Computing / Data security / Computer security / Crime prevention / National security / Security service / Message authentication code / Virtual private network / Public-key cryptography / Computer network security / Cryptography / Security

The use of information technology standards to secure telecommunication networks

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2009-05-25 16:54:07
376Key management / Authenticator / Hardware security module / Key / Smart card / Authentication / Cryptography / Security / Cryptomathic

KMS Case Study - MasterCard Key Generation  Revocation 

Add to Reading List

Source URL: www.cryptomathic.com

Language: English - Date: 2013-03-25 07:56:26
377Key management / PGP / Email authentication / X.509 / Email client / Encryption software / Digital signature / Pretty Good Privacy / Web of trust / Cryptography / Public-key cryptography / Cryptographic software

Group Test Encryption www.scmagazine.com Encryption is becoming an essential tool in modern business, partly due to the increasing use of mobile computing says Geoff Marshall

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 12:52:22
378Computing / Public-key cryptography / Access control / IEEE 802.1X / X.509 / Password / Kerberos / Authentication / Cloud computing / Cryptography / Computer network security / Security

Emerging Applications IoT Authentication email

Add to Reading List

Source URL: ieee802.org

Language: English - Date: 2014-07-15 18:59:28
379Computer network security / Key management / Kerberos / Generic Security Services Application Program Interface / Single sign-on / Ticket Granting Ticket / Key distribution center / Cryptographic protocols / Generic Security Service Algorithm for Secret Key Transaction / Computer security / Computing / Cryptography

Simplify enterprise Java authentication with single sign-on Design secure client/server Java applications that use GSS-API and Kerberos tickets to implement SSO Faheem Khan ([removed]) Consultant

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2013-09-18 06:43:11
380Electronic commerce / Email authentication / Public key certificate / Certificate authority / S/MIME / Digital signature / Man-in-the-middle attack / Pretty Good Privacy / Web of trust / Cryptography / Public-key cryptography / Key management

Enhanced certificate transparency and end-to-end encrypted mail Mark D. Ryan University of Birmingham, UK CloudTomo Ltd.

Add to Reading List

Source URL: www.computer-science.birmingham.ac.uk

Language: English - Date: 2013-12-10 12:27:25
UPDATE