Key authentication

Results: 993



#Item
451Information / Communications protocol / Burrows–Abadi–Needham logic / Key-agreement protocol / Authentication protocol / Dolev-Yao model / Protocol / Public-key cryptography / Station-to-Station protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis Catherine Meadows

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-26 15:14:05
452Computer network security / XKMS / Information / Cryptographic nonce / Challenge-response authentication / Replay attack / Cryptographic protocols / Cryptography / Cyberwarfare

CHAPTER 5. SECURITY CONSIDERATIONS 34 service because the Web service only knows this secret key: nonce = time + serial number + M AC(time + serial number, secret key)

Add to Reading List

Source URL: lists.w3.org

Language: English - Date: 2015-01-08 21:59:19
453Information / Challenge-response authentication / Password authentication protocol / Public-key cryptography / Cryptographic nonce / Needham–Schroeder protocol / Otway–Rees protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]Environmental Requirements for Authentication Protocols Ran Canetti1 and Catherine Meadows2 and Paul Syverson2 1

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 10:13:46
454Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Public-key cryptography / Cryptographic nonce / XTR / Deniable authentication / Security protocol notation / Wide Mouth Frog protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]The Logic of Authentication Protocols ?

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:09:46
455HTTP / Computer security / Computer network security / Secure communication / Internet standards / Transport Layer Security / Digest access authentication / Basic access authentication / Password / Security / Computing / Cryptographic protocols

UNC School of Medicine  Web Publishing Security Policy  Overview  The World Wide Web (WWW) is a key strategic resource for communication, teaching, research  and administration and plays a vita

Add to Reading List

Source URL: www.med.unc.edu

Language: English - Date: 2008-03-24 11:00:55
456Internet / Internet privacy / Email / Public-key cryptography / Email encryption / S/MIME / Pretty Good Privacy / Encryption / IBM Lotus Notes / Cryptography / Email authentication / Computing

Eze Encryption Overview Datasheet

Add to Reading List

Source URL: www.eci.com

Language: English - Date: 2014-01-30 12:32:08
457Surveillance / Fingerprint recognition / Fingerprint / Automated fingerprint identification / Public key fingerprint / Authentication / Palm print / Fingerprint Verification Competition / Finger vein recognition / Fingerprints / Biometrics / Security

Special Issue on Security for Network Society Detection and Recognition Technologies Fingerprint Identification By Kaoru UCHIDA*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:28:48
458Digital signature / Digital credential / Cryptography / Public-key cryptography / Group signature

Special Issue on Security for Network Society Fundamental Security Technologies Anonymous Authentication: For Privacy and Security By Kazue SAKO,* Shoko YONEZAWA* and Isamu TERANISHI*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:15
459Cryptography / Kerberos / Key distribution center / Ticket Granting Ticket / Generic Security Services Application Program Interface / Integrated Windows Authentication / Authentication server / Ticket / STARTTLS / Computer network security / Computing / Computer security

Shishi Kerberos 5 implementation for the GNU system for version 1.0.2, 3 April 2013 Simon Josefsson

Add to Reading List

Source URL: www.gnu.org

Language: English - Date: 2013-04-03 06:58:02
UPDATE