Key authentication

Results: 993



#Item
671Cryptographic hash functions / Data Encryption Standard / Advanced Encryption Standard / Symmetric-key algorithm / Key size / FIPS 140-2 / Block cipher / SHA-2 / Message authentication code / Cryptography / Key management / Cryptography standards

ITS-SEC-01 Data Encryption and Cryptography

Add to Reading List

Source URL: oit.ohio.gov

Language: English - Date: 2010-03-08 12:44:45
672DigiCert / Public key infrastructure / Certificate authority / Authentication / X.509 / Public key certificate / Cryptography / Public-key cryptography / Key management

7 July 2011 This Issue TAGPMA P.1

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2011-09-29 16:25:36
673Thawte / Root certificate / Verisign / Certificate authority / Protected Extensible Authentication Protocol / Public key certificate / Cryptography / Public-key cryptography / Key management

Windows 7 UAWiFi Manual Setup First, open the Network and Sharing Center by clicking on your Wireless Network icon in the bottom right corner of the screen. In the window that comes up, choose “Manage wireless networks

Add to Reading List

Source URL: uits.arizona.edu

Language: English - Date: 2012-08-13 18:56:31
674DigiCert / Extended Validation Certificate / Internet Explorer / Electronic commerce / Public-key cryptography / Two-factor authentication / Internet Explorer 9 / Security token / Authentication / Cryptography / Key management / Certificate authorities

DigiCert SSL Certificate Newsletter September 2012

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2012-09-20 13:44:53
675X.509 / ID-based encryption / Public key infrastructure / Authentication server / Revocation list / Certificate authority / Kerberos / Public key certificate / Authentication / Cryptography / Public-key cryptography / Key management

A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2007-03-15 09:46:20
676Padding / Block cipher modes of operation / IPsec / Initialization vector / Block cipher / Stream cipher / Internet Key Exchange / Cryptanalysis / Message authentication code / Cryptography / Cryptographic protocols / Internet protocols

Side Channel Analyses of CBC Mode Encryption Arnold K. L. Yau Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2009-07-05 19:55:24
677Quantum cryptography / Applied mathematics / Quantum key distribution / BB84 / Quantum entanglement / Kerberos / Quantum computer / Password / Key size / Cryptography / Theoretical computer science / Quantum information science

Authentication and Authorization Using Entangled Photons

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-26 01:00:00
678Block cipher modes of operation / Finite fields / Message authentication codes / Cryptographic Message Syntax / Key Management Interoperability Protocol / Key management / PKCS / Internet security / Galois/Counter Mode / Cryptography / Cryptographic protocols / Public-key cryptography

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-04-29 10:56:53
679Identification / Biometrics / AirPrint / Computer printing / iOS / Authentication / Public key fingerprint / Security / Fingerprints / Cryptography

AIRprint Long Range Fingerprint System I RAPID I TOUCHLESS

Add to Reading List

Source URL: www.idairco.com

Language: English - Date: 2012-11-13 09:44:17
680Control key / Windows Explorer / Transaction authentication number / Human resource management system / Software / Computing / Management / SAP / ERP software / T-code

HRMS Basics – Screen Elements Favorites: Each user can add transactions, reports, files, and web sites that he/she uses most. Command Field (white box) Title Bar

Add to Reading List

Source URL: hr.wa.gov

Language: English - Date: 2014-08-29 17:35:02
UPDATE