Key authentication

Results: 993



#Item
851Security / Cyberwarfare / Password / One-time password / Transaction authentication number / Public key certificate / Online banking / Interactive voice response / NemID / Key management / Public-key cryptography / Computer security

Generelle vilkår for certifikatindehavere

Add to Reading List

Source URL: www.nemid.nu

Language: English - Date: 2013-02-21 10:11:01
852Ubiquitous computing / Public-key cryptography / Key management / EMV / Smart card / Symmetric-key algorithm / Authentication / Information security / Key size / Cryptography / Security / ISO standards

Internal market - Finacial services - Security & Confidentiality : The Security of Chip Cards

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2009-04-23 06:14:29
853Cryptographic hash functions / Block cipher / Radio-frequency identification / Stream cipher / Initialization vector / Symmetric-key algorithm / Authenticated encryption / VEST / Advanced Encryption Standard / Cryptography / Message authentication codes / Block cipher modes of operation

A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
854Cryptographic protocols / Propositional calculus / Boolean algebra / Classical logic / Kerberos / Modal logic / Public-key cryptography / Yahalom / Burrows–Abadi–Needham logic / Logic / Cryptography / Mathematical logic

A Semantics for a Logic of Authentication (Extended Abstract) Martn Abadi Digital Equipment Corporation

Add to Reading List

Source URL: www.markrtuttle.com

Language: English - Date: 2007-04-26 00:00:00
855United Kingdom company law / Law / Electronic commerce / Public key certificate / Registrar of Companies / Civil law / Registrar / Authentication / Key management / Security / Public-key cryptography

REGISTRAR’S RULES 2009 VOLUME 5 AUTHENTICATION OF A CERTIFICATE SENT BY THE REGISTRAR BY ELECTRONIC MEANS Made

Add to Reading List

Source URL: www.companieshouse.gov.uk

Language: English - Date: 2012-11-30 07:34:28
856SPEKE / Password Authenticated Key Exchange by Juggling / Encrypted key exchange / Diffie–Hellman key exchange / Password / Public-key cryptography / IEEE P1363 / Key exchange / Authentication / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password Authenticated Key Exchange by Juggling - A key exchange protocol without PKI

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-16 17:16:56
857Password-authenticated key agreement / Electronic commerce / Password / Two-factor authentication / Man-in-the-middle attack / Biometrics / Security token / RSA / Authentication / Cryptography / Security / Cryptographic protocols

Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke School of Computing Science Newcastle University {feng.hao, dylan.clarke}@ncl.ac.uk

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2012-01-30 18:16:54
858MQV / Key-agreement protocol / Public-key cryptography / Password-authenticated key agreement / Alice and Bob / XTR / Key authentication / Station-to-Station protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / YAK

On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-12-25 18:38:22
859Notary / Fingerprints / Human anatomy / Identification / Authentication / United States Secretary of State / United States Department of State / Secretary of state / Public key fingerprint / Security / Cryptography / Biometrics

STATE OF NEBRASKA ♦ SECRETARY OF STATE’S OFFICE 1445 “K” ST. • STATE CAPITOL SUITE 1301 • LINCOLN, NE • 68509 BUSINESS SERVICES DIVISION Corporations P.O. BOX 94608

Add to Reading List

Source URL: www.sos.ne.gov

Language: English - Date: 2012-08-13 10:04:15
860Random oracle / Public-key cryptography / Authentication protocol / Smart card / Key-agreement protocol / Perfect forward secrecy / Cryptography / Cryptographic protocols / Advantage

A Cryptographic Analysis of OPACITY ¨ ur Dagdelen Ozg¨ Marc Fischlin Tommaso Gagliardoni Giorgia Azzurra Marson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-22 11:29:49
UPDATE