Key authentication

Results: 993



#Item
601Cryptographic primitive / Random oracle / Man-in-the-middle attack / Transport Layer Security / Password / Cryptographic hash function / Key / Secure Shell / Deniable authentication / Cryptography / Cryptographic protocols / Secure communication

Report on DIMACS∗ Workshop on Cryptography: Theory Meets Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the PORTIA project. Date of Workshop: October 14

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-15 15:00:33
602X.509 / ID-based encryption / Public key infrastructure / Authentication server / Revocation list / Certificate authority / Kerberos / Public key certificate / Authentication / Cryptography / Public-key cryptography / Key management

A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-13 09:22:49
603Cyberwarfare / Kerberos / Ticket Granting Ticket / NTLM / Integrated Windows Authentication / LM hash / Pass the hash / Password / Key distribution center / Computer network security / Computer security / Cryptography

Protection from Kerberos Golden Ticket Mitigating pass the ticket on Active Directory CERT-EU Security White Paper[removed]Introduction Kerberos authentication protocol is the preferred authentication mechanism used by

Add to Reading List

Source URL: cert.europa.eu

Language: English - Date: 2014-06-30 05:08:30
604X.509 / Authorization certificate / Public key certificate / Certificate authority / PERMIS / Public key infrastructure / Authentication / Proxy voting / Proxy server / Cryptography / Public-key cryptography / Key management

Microsoft Word - pki04-welch-proxy-cert-final.doc

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-03-24 17:11:11
605Computer network security / Simple public key infrastructure / Cryptographic protocols / Authorization certificate / RADIUS / Wireless security / X.509 / IEEE 802.1X / Authentication / Cryptography / Key management / Public-key cryptography

Greenpass: Decentralized, PKI-Based Authorization for Wireless LANs Nicholas C. Goffee, Sung Hoon Kim, Sean Smith, Punch Taylor, Meiyuan Zhao, John Marchesini Department of Computer Science Dartmouth College

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-04-13 10:51:19
606Identity management / Identity / Open government / Public administration / Access control / Authentication / Identity theft / Public key infrastructure / E-Government / Cryptography / Security / Computer security

Discussion Paper on Identity Authentication and Authorization in Electronic Service Delivery - An Ontario Perspective

Add to Reading List

Source URL: www.iccs-isac.org

Language: English - Date: 2011-07-18 11:26:33
607Public-key cryptography / Internet protocols / Internet standards / Key management / Directory services / Integrated Windows Authentication / Single sign-on / RADIUS / Kerberos / Cryptography / Computing / Microsoft Windows

Microsoft Word - ANLPKIAppV60Final.doc

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-12 18:50:30
608Email / Internet standards / Online chat / Cryptographic protocols / Secure messaging / Transport Layer Security / Public key infrastructure / Two-factor authentication / Instant messaging / Cryptography / Computing / Public-key cryptography

On Securing the Public Health Information Network Messaging System

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-03-07 13:17:14
609Public key infrastructure / Certificate policy / X.509 / Revocation list / Digital signature / Public key certificate / Certificate authority / Authentication / Records management / Cryptography / Key management / Public-key cryptography

Records Management Guidance For PKI Digital Signature Authenticated and Secured Transaction Records March 11, 2005

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2009-11-20 16:28:13
610Cryptographic protocols / Spam filtering / Yahoo! / DomainKeys Identified Mail / DomainKeys / S/MIME / Digital signature / Cisco Systems / SMTP / Cryptography / Email authentication / Public-key cryptography

DomainKeys Identified Mail (DKIM) and Certificates

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2006-04-05 05:56:14
UPDATE