Key authentication

Results: 993



#Item
901Security / Kerberos / Generic Security Services Application Program Interface / Key distribution center / Authentication / Password / NTLM / X Window authorization / Computer network security / Computer security / Cyberwarfare

Kerberos Revisited Quantum-Safe Authentication M. Campagna ([removed]), T. Hardjono (MIT), L. Pintsov (Pitney Bowes), B. Romansky (Pitney Bowes) and T. Yu (MIT)

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2013-09-26 08:11:15
902Electronic commerce / Key management / Trusted timestamping / Digest access authentication / Transport Layer Security / MD5 / X.509 / Cryptographic nonce / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

CMSC 681 Project Report Implementation of TSP Protocol ---CMSC 681 Project Report Youyong Zou

Add to Reading List

Source URL: www.csee.umbc.edu

Language: English - Date: 2000-12-14 22:35:14
903Computer security / JIPDEC / Electronic commerce / Information security / ISO/IEC 27001 / Electronic signature / Public key certificate / Authentication / Security / Data security / Economy of Japan

JIPDEC Business Prospectus Our objective is to establish a safe and secure digital society where people can… ●create and use information sourced from a variety of aggregators, producers, participatory frameworks, o

Add to Reading List

Source URL: english.jipdec.or.jp

Language: English - Date: 2013-11-29 02:05:58
904Key management / Cyberwarfare / Kerberos / Ticket Granting Ticket / Cryptographic protocols / Single sign-on / Key distribution center / Internet protocols / Generic Security Service Algorithm for Secret Key Transaction / Computer network security / Cryptography / Computer security

Single Sign On with Kerberos (Get a Ticket Granting Ticket then Use it to Obtain a Service Ticket) User Client Kerberos Key Distribution Center Authentication

Add to Reading List

Source URL: www.eventhelix.com

Language: English - Date: 2014-05-21 23:18:03
905Cryptographic protocols / Key management / HMAC / Key derivation function / Cryptographic hash function / Transport Layer Security / Key / CMAC / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP[removed]Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:44:46
906Advanced Encryption Standard / Stream ciphers / Message authentication codes / Key schedule / Matrix / Vector space / MDS matrix / VEST / XSL attack / Algebra / Cryptography / Mathematics

Essential Algebraic Structure Within the AES S. Murphy and M.J.B. Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K. [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2002-06-10 08:26:30
907Stream ciphers / Message authentication codes / Block cipher / Data Encryption Standard / Cipher / Linear cryptanalysis / Nicolas Courtois / Key schedule / Hidden Field Equations / Cryptography / XSL attack / Advanced Encryption Standard

Computational and Algebraic Aspects of the Advanced Encryption Standard Carlos Cid, Sean Murphy and Matthew Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-03 11:48:26
908Authentication protocol / Diffie–Hellman key exchange / Public-key cryptography / Password authentication protocol / Random oracle / Key-agreement protocol / Cryptography / Cryptographic protocols / Internet protocols

Authentication for Paranoids: Multi-Party Secret Handshakes Stanislaw Jarecki, Jihye Kim, and Gene Tsudik Computer Science Department University of California, Irvine {stasio, jihyek, gts}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2006-07-12 12:31:28
909Access control / Cryptographic protocols / Simple public key infrastructure / X.509 / Public key certificate / Authentication / PERMIS / Internet privacy / Authorization certificate / Cryptography / Public-key cryptography / Key management

Implementing Access Control to People Location Information Urs Hengartner† and Peter Steenkiste†‡ † Department of Computer Science ‡

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-07-01 17:17:59
910Symmetric-key algorithm / Cipher / LORAN / Key / RSA / Chosen-plaintext attack / Authenticated encryption / Cryptography / Public-key cryptography / Ciphertext

Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Add to Reading List

Source URL: waas.stanford.edu

Language: English - Date: 2006-06-13 19:25:54
UPDATE