Key authentication

Results: 993



#Item
461Deniable encryption / Deniable authentication / ID-based encryption / Digital signature / Commitment scheme / Zero-knowledge proof / RSA / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic protocols

Deniable Ring Authentication∗ Moni Naor Weizmann Institute of Science Rehovot 76100, Israel [removed]

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2002-06-03 03:07:12
462IP / Message authentication code / NP / Cryptography / Public-key cryptography / Digital signature

J. Cryptol[removed]: 310–348 DOI: [removed]s00145[removed]Multi-Verifier Signatures∗ Tom Roeder† Microsoft Research, Redmond, USA

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-03-16 18:26:36
463Cryptography / Biometrics / Locksmithing / Access control / Fingerprint / Public key fingerprint / Password / Lock / Authentication / Security / Fingerprints / Identification

1TouchIQ2_Manual_v1.4.cdr

Add to Reading List

Source URL: 1touchlock.com

Language: English - Date: 2011-12-02 13:38:01
464Cyberwarfare / Computing / Kerberos / Ticket Granting Ticket / Single sign-on / Authentication protocol / Key distribution center / Apple Open Directory / Computer network security / Computer security / Key management

Taming the Beast Assess Kerberos-Protected Networks Emmanuel Bouillon                           

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
465Cryptography / Kerberos / Ticket Granting Ticket / Single sign-on / Key distribution center / Integrated Windows Authentication / NTLM / Ticket / Authentication server / Computer network security / Computer security / Computing

Microsoft Word - white_paper_draft_2.doc

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
466Identification / Biometrics / Fingers / Human anatomy / Authentication / Public key fingerprint / Two-factor authentication / Multi-factor authentication / Security / Fingerprints / Cryptography

02 - Fingerprint Biometrics Liveness Detection

Add to Reading List

Source URL: www.i2r.a-star.edu.sg

Language: English - Date: 2014-10-30 23:07:22
467Public-key cryptography / Message authentication code / Key-agreement protocol / Key / Public key infrastructure / AKA / Symmetric-key algorithm / Cryptographic key types / Internet security / Cryptography / Cryptographic protocols / Key management

Microsoft Word - D200 2-Updated22Jan2010.doc

Add to Reading List

Source URL: www.foi.se

Language: English - Date: 2012-06-18 09:13:05
468Computer network security / IEEE 802.11 / Computing / Technology / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / Temporal Key Integrity Protocol / Wired Equivalent Privacy / Cryptography / Wireless networking / Cryptographic protocols

Wireless Security’s Future Bruce Potter Cigital, Inc[removed]Ridgetop Circle Suite 400

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
469Public-key cryptography / Email authentication / Email / S/MIME / Public key infrastructure / Secure communication / Email client / Secure messaging / Cryptography / Computing / Internet privacy

Totemo TrustMail® Overview Totemo TrustMail® is a complete, standards-based encryption solution that runs on Sentrion, supporting S/MIME and OpenPGP. It provides an Internal Encryption option that simplifies management

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2012-04-04 15:31:26
470Certificate authorities / Comodo Group / Email / Electronic commerce / Public key infrastructure / Two-factor authentication / Authentication / Phishing / X.509 / Cryptography / Public-key cryptography / Key management

Driving Company Security is Challenging. Comodo Personal Authentication Certificates Cost effective and flexible solution adds trust and security to key business areas of secure email, document signing and user-authenti

Add to Reading List

Source URL: ssl.comodo.com

Language: English - Date: 2014-08-21 10:46:06
UPDATE