Key authentication

Results: 993



#Item
521Public-key cryptography / Electronic commerce / Authentication / Identity document / Public key certificate / Digital signature / Cryptography / Notary / Key management

Fiscal Service PKI Certificate In-Person Proofing Verification

Add to Reading List

Source URL: www.fms.treas.gov

Language: English - Date: 2007-08-27 14:14:14
522Email authentication / Internet privacy / Key management / Kerberos / Message authentication code / Password / S/MIME / Digital signature / Cryptographic hash function / Cryptography / Computer security / Public-key cryptography

Young, A., Kirstein, P. and Ibbetson, A[removed]Technologies to Support Authentication in Higher Education : A Study for the UK Joint Information Systems Committee, August 21th, 1996. Other. UKOLN, University of Bath, Ba

Add to Reading List

Source URL: opus.bath.ac.uk

Language: English - Date: 2014-12-16 19:39:40
523Information / Public-key cryptography / Communications protocol / Password-authenticated key agreement / Yahalom / Cryptography / Cryptographic protocols / Data

Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
524Internet standards / Internet protocols / Computing / Authentication protocol / TSIG / Public-key cryptography / Password / Cryptography / Cryptographic protocols / Internet

Automatically Detecting Authentication Limitations in Commercial Security Protocols Stephen H. Brackin  Arca Systems, Inc. 303 E. Yates St. Ithaca, NY 14850

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
525Fingerprints / Biometrics / Access control / Two-factor authentication / Password / Authentication / Public key fingerprint / BioAPI / Password manager / Security / Cryptography / Identification

The Case for Replacing Passwords with Biometrics Markus Jakobsson Extricatus LLC Abstract—The threat of malware and phishing is engulfing the web. It is expected to be an even greater threat in the mobile

Add to Reading List

Source URL: www.mostconf.org

Language: English - Date: 2012-04-22 18:29:26
526Public-key cryptography / DigiCert / Electronic commerce / Warranty / Authentication / Public key certificate / Certificate authority / Contract / Cryptography / Key management / Contract law

RELYING PARTY AGREEMENT AND LIMITED WARRANTY YOU ARE REQUIRED TO READ THIS AGREEMENT CAREFULLY BEFORE RELYING ON A DIGICERT CLICKID SITE SEAL, SSL CERTIFICATE, OR OTHER SITE AUTHENTICATION PRODUCT OR SERVICE. IF YOU DO N

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2013-07-31 14:52:22
527Computer network security / Public-key cryptography / Internet standards / Email authentication / Cryptographic software / Kerberos / Password / Challenge-response authentication / Pretty Good Privacy / Cryptography / Computer security / Computing

Technologies to Support Authentication in Higher Education v5 A. Young, I.T.Institute, University of Salford P.T. Kirstein, Department of Computer Science, University College London A. Ibbetson, Computing Laboratory, Uni

Add to Reading List

Source URL: www.ukoln.ac.uk

Language: English - Date: 1998-10-01 11:42:21
528Diffie–Hellman key exchange / Public-key cryptography / Key generation / Key authentication / Algorithm / Key / Cryptography / Key management / Cryptographic protocols

An Ecient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups Jim Alves-Foss Center for Secure and Dependable Software University of Idaho

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
529HTTP / Man-in-the-middle attack / Password / Authentication / AKA / HTTP cookie / Public-key cryptography / Cryptography / Security / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-10-20 18:25:36
530Electronic commerce / Electronic documents / Public key infrastructure / HID Global / Entrust / Electronic health record / Assa Abloy / Two-factor authentication / Public key certificate / Cryptography / Key management / Public-key cryptography

IdenTrust Digital Identities Secure MEDENT’s Electronic Health Records News Highlights: • • •

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-11-24 11:54:34
UPDATE