Key authentication

Results: 993



#Item
501System Architecture Evolution / Computing / GSM / Keccak / 3GPP / 3GP and 3G2 / European Telecommunications Standards Institute

TS[removed]V12[removed]Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2,

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-10-22 07:44:23
5023GP and 3G2 / European Telecommunications Standards Institute / ICE / Keccak / VEST / System Architecture Evolution / GSM / Cryptography / 3GPP / Computing

TS[removed]V12[removed]Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2,

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-10-22 07:44:41
503Block cipher / Cipher / Initialization vector / Feistel cipher / Cryptographic hash function / Key / Stream cipher / Public-key cryptography / Message authentication code / Cryptography / Key management / Symmetric-key algorithm

Chapter Cryptographic Tools and Techniques 1

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-12-25 07:16:38
504Root certificate / Public key certificate / Digital signature / HTTP Secure / Authentication / Self-signed certificate / Chain of trust / Cryptography / Public-key cryptography / Key management

Frequently Asked Questions (FAQs) on Digital Signature Certificates – Employers Q:- What is a Digital Signature? Ans:- A digital signature is an electronic form of a signature that can be used to authenticate the ident

Add to Reading List

Source URL: epfindia.gov.in

Language: English - Date: 2013-10-04 08:00:11
505Electronic commerce / Email authentication / Public key certificate / Certificate authority / S/MIME / Digital signature / Man-in-the-middle attack / Pretty Good Privacy / Web of trust / Cryptography / Public-key cryptography / Key management

Enhanced certificate transparency and end-to-end encrypted mail Mark D. Ryan University of Birmingham, UK CloudTomo Ltd.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-16 09:42:59
506Cryptographic protocols / Public-key cryptography / Key management / Digital credential / Authentication / Public key certificate / Privacy / Electronic health record / Health Insurance Portability and Accountability Act / Cryptography / Electronic commerce / Identity management

November 29, 2010 David Blumenthal, MD, MPP National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W.

Add to Reading List

Source URL: healthit.gov

Language: English - Date: 2013-08-15 17:27:34
507Message authentication codes / HMAC / Hashing / Advanced Encryption Standard / FIPS 140 / Key / Transport Layer Security / Cryptography / Cryptography standards / Cryptographic protocols

Barco ICMP FIPS[removed]Non-Proprietary Security Policy ICMP Barco ICMP FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:48:39
508Quantum cryptography / Quantum key distribution / Physical Unclonable Function / Quantum mechanics / Photon / Challenge-response authentication / Public-key cryptography / Quantum / Authentication / Physics / Cryptography / Quantum information science

Letter QUANTUM-SECURE AUTHENTICATION OF A PHYSICAL UNCLONABLE KEY SEBASTIANUS A. GOORDEN,1 MARCEL HORSTMANN,1,2 ALLARD P. MOSK,1 BORIS ŠKORIĆ,3 AND PEPIJN W.H. PINKSE1,*

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2014-12-18 09:21:18
509Information / Internet of Things / Extensible Authentication Protocol / 6LoWPAN / Constrained Application Protocol / Transport Layer Security / IPsec / Internet security / Internet Key Exchange / Cryptographic protocols / Computing / Data

Security Challenges in the IP-based Internet of Things∗ Tobias Heer∗ , Oscar Garcia-Morchon† , Ren´e Hummen∗ , Sye Loong Keoh† , Sandeep S. Kumar† , and Klaus Wehrle∗ ∗

Add to Reading List

Source URL: iotsecuritylab.com

Language: English - Date: 2014-08-14 00:21:28
510WLAN Authentication and Privacy Infrastructure / Science / Mathematical sciences / Business / Export of cryptography in the United States / Cryptographic protocols / Cryptography / Non-tariff barriers to trade

Why Do We Need Encryption Rules in the TPP? Takaaki Sashida1| September 2013 A key priority for the U.S. semiconductor industry regarding the Trans-Pacific Partnership (TPP) Agreement currently

Add to Reading List

Source URL: www.semiconductors.org

Language: English - Date: 2013-09-24 16:48:12
UPDATE