Key authentication

Results: 993



#Item
701Computer network security / MQV / Diffie–Hellman key exchange / Authentication / AKA / Cryptography / Cryptographic protocols / Public-key cryptography

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 186–200. A New Key Exchang

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
702Public-key cryptography / Comodo Group / Identity management / Identity assurance / Authentication / Melih Abdulhayoğlu / Cryptography / Certificate authorities / Key management

Creating Trust Online TM Creating Trust Online

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2011-11-10 11:53:07
703Certificate authorities / Electronic commerce / Comodo Group / Phishing / Authentication / Identity assurance / Public key certificate / Comparison of SSL certificates for web servers / Cryptography / Key management / Public-key cryptography

Creating Trust Online TM Creating Trust Online

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2011-11-10 11:53:07
704Block cipher modes of operation / Keystream / Block cipher / Ciphertext / Symmetric-key algorithm / Advanced Encryption Standard / Authenticated encryption / Cryptographic nonce / RC4 / Cryptography / Stream ciphers / Phelix

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:23
705Data security / Electronic signature / Key management / Public-key cryptography / Digital signature / Authentication / Information security / Smart card / Biometrics / Security / Cryptography / Notary

Microsoft Word - Framwork for Electronic Signature Reciprocity - Exposure D.

Add to Reading List

Source URL: www.azsos.gov

Language: English - Date: 2002-10-17 08:43:34
706Key management / Authentication / Digital signature / Non-repudiation / Electronic authentication / Key / Cryptography / Public-key cryptography / Notary

This rule was filed as 1 NMAC[removed]TITLE 1 CHAPTER 12 PART 7 GENERAL GOVERNMENT

Add to Reading List

Source URL: www.nmcpr.state.nm.us

Language: English - Date: 2004-02-09 12:11:46
707Notary / Electronic signature / Digital signature / Public key certificate / Certificate policy / Signature / Authentication / MERS / DomainKeys Identified Mail / Cryptography / Key management / Public-key cryptography

SIGNATURE DYNAMICS ELECTRONIC SIGNING POLICY for electronic signature use version as of April 25, 2001

Add to Reading List

Source URL: azsos.gov

Language: English - Date: 2002-12-09 18:12:24
708DVD / Public-key cryptography / Media Key Block / Device Keys / Blu-ray Disc / Public key certificate / Email / China Blue High-definition Disc / Authentication / Cryptography / Advanced Access Content System / Key management

AACS Key Order Form ORDER FORM TO AACS KEY GENERATION FACILITY (“KGF”) For all orders, Licensee is advised to confirm eligibility under the applicable Approved License to order the AACS Keys requested via this Key Or

Add to Reading List

Source URL: www.aacsla.com

Language: English - Date: 2012-02-28 04:31:31
709Computer network security / Password / Key management / Kerberos / Ticket Granting Ticket / Salt / Secure Remote Password protocol / Authentication server / Password manager / Cryptography / Computer security / Cyberwarfare

A Real-World Analysis of Kerberos Password Security Thomas Wu Computer Science Department Stanford University [removed]

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-10-02 14:08:12
710Key management / Electronic commerce / Biometrics / Passports / Entrust / X.509 / Biometric passport / Authentication / Public key certificate / Cryptography / Security / Public-key cryptography

Entrust Solutions for ePassport Issuance & Validation Kumar Vankalapati, Entrust 2013 MRTD Symposium

Add to Reading List

Source URL: www.icao.int

Language: English - Date: 2013-10-22 13:21:29
UPDATE