Key authentication

Results: 993



#Item
61Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Certificate policy / Certificate authority / Public key certificate / Revocation list / X.509 / Energy Sciences Network / Authentication

Microsoft Word - CP-CPS-V25.doc

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2004-08-17 13:10:06
62Computer network security / Key management / Authentication protocols / Kerberos / Key distribution center / Ticket Granting Ticket / Ticket / Shared secret / NT LAN Manager / Authentication server

-- -- The Evolution of the Kerberos Authentication Service John T. Kohl

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2004-04-08 15:18:56
63Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
64Packaging / Computer access control / Cryptography / ISO standards / Ubiquitous computing / Smart card / Patent claim / Authentication / Public-key cryptography / Tamper resistance

USOO5276736A United States Patent]

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:27
65Computer network security / ISO standards / Computer access control / Access control / Internet protocols / Common Criteria / Security Target / Authentication / Computer security / Key management / Password / Virtual private network

collaborative Protection Profile for Network Devices

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 07:40:18
66Computer access control / Public-key cryptography / Identity management / Mobile signature / Signature / Security token / Public key infrastructure / Authentication / 3-D Secure / Electronic authentication / Disk encryption

Keyhub_Product_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-10 04:15:28
67Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate policy / Public key certificate / Certificate authority / Revocation list / X.509 / Certification Practice Statement / Energy Sciences Network / Authentication

DOE Grids Certificate Policy And Certification Practice Statement Version 2.3

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2004-03-19 16:52:58
68Public-key cryptography / Access control / Message-oriented middleware / Identity management / Distributed computing architecture / Publishsubscribe pattern / ID-based encryption / Authentication / Encryption / Cryptographic protocol / Extensible Authentication Protocol / PubSubHubbub

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:14:55
69Biometrics / Identification / Fingerprints / Fingerprinting algorithms / Fingerprint recognition / Surveillance / Fingerprint / Public key fingerprint / Privacy / Internet privacy / Authentication / Fingerprint Verification Competition

Preprint of paper for WIFS2010. 1 INTRODUCTION

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2011-02-20 12:09:41
70Signature / Public-key cryptography / Cryptography standards / Computer law / Key management / Public key certificate / Authentication / Digital signature / Electronic signature / Qualified electronic signature / RSA SecurID / FIPS 140-2

Confirmation pursuant to ยง 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-02-05 10:51:00
UPDATE