Key authentication

Results: 993



#Item
41Cryptography / Key management / Public-key cryptography / Transport Layer Security / Public key infrastructure / Certificate authority / IdenTrust / Root certificate / Public key certificate / Authentication

IdenTrust™ Certificate Enablement Toolkit Rapid Integration and Certification Certificate enablement and IdenTrust™Compliant Certification Made Easy As the electronic world becomes increasing more prone to fraud,

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:52:40
42Cryptography / Formal methods / Theoretical computer science / Computing / Computer security / Logic in computer science / Public key infrastructure / Formal verification / Correctness / Proof-carrying code / Authentication / Code signing

Advances in Programming Languages Certifying correctness David Aspinall School of Informatics The University of Edinburgh

Add to Reading List

Source URL: www.inf.ed.ac.uk

Language: English - Date: 2010-01-27 19:53:39
43Computing / Network architecture / Cryptographic protocols / Internet protocols / Tunneling protocols / Wireless networking / IPsec / Internet security / Extensible Authentication Protocol / Internet Key Exchange / 6LoWPAN / Virtual private network

Name : Azamuddin Rotation Project Title : Survey on IoT Security Outline : • • •

Add to Reading List

Source URL: www.cs.wustl.edu

Language: English - Date: 2016-01-09 09:36:29
44Cryptography standards / Computer law / Signature / E-commerce / Regulation / EIDAS / Public key certificate / Electronic signature / Authentication / Trust service provider / Draft:Test Qualified digital certificate

European Regulation on Electronic Título de presentación Identification and Trust Services Raúl Rubio Nombre Baker

Add to Reading List

Source URL: www.observatoriotui.com

Language: English
45Public-key cryptography / Notary / Elliptic curve cryptography / Randomness / Finite fields / Radio-frequency identification / Authentication protocol / Physical unclonable function / Authentication / Digital signature / Quantum readout of PUFs / Types of physical unclonable function

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-08-29 03:45:16
46Computer access control / Identity management / Federated identity / Security token / Mobile signature / Password / Authentication / Public key infrastructure / Multi-factor authentication / Mobile identity management / OpenID / Subscriber identity module

Keyhub_Technical_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-13 04:56:07
47Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Biometrics / Certificate authority / Man-in-the-middle attack / X.509 / Authentication / Key / Revocation list / Public key certificate

Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-11-05 15:10:51
48Computer access control / Key management / Access control / Public-key cryptography / Identity management / Simple public-key infrastructure / Authorization certificate / Authentication / Public key infrastructure / Delegation / PERMIS / Authorization

Delegation Logic: A Logic-based Approach to Distributed Authorization NINGHUI LI Stanford University BENJAMIN N. GROSOF Massachusetts Institute of Technology

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-12-29 15:33:54
49Cryptography / Symmetric-key algorithm / Cipher / Encryption / Public-key cryptography / RSA / Key / Block cipher mode of operation / Multiple encryption

Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Add to Reading List

Source URL: gps.stanford.edu

Language: English - Date: 2006-06-13 19:25:54
50Computer network security / NT LAN Manager / Kerberos / Integrated Windows Authentication / Authentication protocol / Challengeresponse authentication / Password / Cain and Abel / Key distribution center / Electronic authentication / Brute-force attack / Pass the hash

Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

Add to Reading List

Source URL: hdm.io

Language: English - Date: 2015-12-05 20:38:27
UPDATE