Key authentication

Results: 993



#Item
811Semantic Web / Cryptographic protocols / Secure communication / FOAF / HTTP Secure / Transport Layer Security / Named graph / X.509 / Public key infrastructure / Cryptography / Public-key cryptography / Key management

FOAF+SSL: RESTful Authentication for the Social Web? Henry Story1 , Bruno Harbulot2 , Ian Jacobi3 , and Mike Jones2 1 2

Add to Reading List

Source URL: dig.csail.mit.edu

Language: English - Date: 2011-02-01 14:35:32
812Data Encryption Standard / Finite fields / Block cipher / CMAC / Authenticated encryption / Block size / Triple DES / Key Wrap / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Morris Dworkin May 29, 2014 Computer Security Division National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:01
813Internet privacy / Public-key cryptography / Email authentication / Email / Computer security / Secure messaging / Public key infrastructure / S/MIME / Comodo Group / Cryptography / Computing / Security

Secure Messaging: Key to the Business Enabled Network A Comodo White Paper Secure Messaging: Key to the Business Enabled Network

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:05
814Key management / Public-key cryptography / Two-factor authentication / Comodo Group / Security token / Phishing / Password / Mutual authentication / Authentication / Cryptography / Security / Certificate authorities

Comodo Authentication Solutions Overview Client Authentication Certificates Two-Factor Authentication Content Verification Certificates

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:05
815Certificate authorities / Comodo Group / Cryptographic protocols / Public key infrastructure / X.509 / Two-factor authentication / Public key certificate / Authentication / Phishing / Cryptography / Public-key cryptography / Key management

Comodo Custom Client Certificates Highly Secure Authentication of Customers and Employees www.instantssl.com [removed]

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:05
816Certificate authorities / Comodo Group / Public key certificate / X.509 / Code signing / S/MIME / Two-factor authentication / Root certificate / GlobalSign / Cryptography / Public-key cryptography / Key management

Comodo Certificate Manager Centrally Managing Enterprise Security, Trust & Compliance Comodo Certificate Manager

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:05
817Identification / Biometrics / Software testing / Access control / Fingerprint / Authentication / Common Criteria / Vulnerability / Public key fingerprint / Security / Cyberwarfare / Computer security

Supporting Document Guidance Characterizing Attacks to Fingerprint Verification Mechanisms 2011

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2014-03-18 10:15:08
818Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

NIST SP[removed], Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-01 16:36:25
819Hashing / Message authentication codes / Cryptographic hash function / Key size / FIPS 140-2 / SHA-2 / Symmetric-key algorithm / Key generation / SHA-1 / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 09:14:27
820Hashing / Message authentication codes / Cryptographic hash function / Key size / SHA-2 / Symmetric-key algorithm / FIPS 140-2 / Digital Signature Algorithm / Key / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section-FORMATTED[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-27 16:11:31
UPDATE