Key authentication

Results: 993



#Item
931Cryptographic hash function / RSA / SHA-1 / Digital signature / Message authentication code / Cryptography / Public-key cryptography / MD5

CS255: Cryptography and Computer Security Winter 2005

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-01-06 01:59:49
932Computer network security / Key management / Kerberos / Generic Security Services Application Program Interface / Single sign-on / Ticket Granting Ticket / Key distribution center / Cryptographic protocols / Generic Security Service Algorithm for Secret Key Transaction / Computer security / Computing / Cryptography

Simplify enterprise Java authentication with single sign-on Design secure client/server Java applications that use GSS-API and

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2013-09-18 06:43:11
933Cryptographic hash function / Cipher / Password / Message authentication code / Public-key cryptography / Index of cryptography articles / Stream cipher / Cryptography / Block cipher / Key

2007 Paper 3 Question 9 Introduction to Security (a) You have received a shipment of hardware random-number generators, each of which can output one 128-bit random number every 10 milliseconds. You suspect that one of t

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:45
934Block cipher / Public-key cryptography / CMAC / Poly1305-AES / Cryptography / Message authentication codes / Cryptographic hash function

2006 Paper 4 Question 10 Introduction to Security (a) Alice and Bob participate in a public-key infrastructure that enables them to exchange legally binding digital signatures. (i ) Name two reasons why, for some purpos

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:43
935Internet standards / Internet protocols / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Man-in-the-middle attack / Key management / Internet / Cryptography / Computing

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prev

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-07-28 17:01:12
936Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Time server / Public-key cryptography / Man-in-the-middle attack / Key / One-time password / Cryptography / Computing / Internet protocols

Cryptographic Authentication for Real-Time Network Protocols1,2 David L. Mills3 Abstract This paper describes a new security model and authentication scheme for distributed, real-time network protocols used in time synch

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-12-02 17:00:16
937Key management / Electronic commerce / Digital signature / Seal / Legal instrument / Public key certificate / Signature / Non-repudiation / Authentication / Cryptography / Public-key cryptography / Notary

Microsoft Word - Document1

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 08:28:33
938Key management / Public-key cryptography / Electronic signature / The Information Technology Act / Electronic Signatures in Global and National Commerce Act / Authentication / Digital signature / Public key certificate / Cryptography / Computer law / Notary

The Information Technology ACT, 2008 Ministry of Law, Justice and Company Affairs (Legislative Department) New Delhi, the 9th June 2000/Jyaistha 19, 1922 (Saka)

Add to Reading List

Source URL: police.pondicherry.gov.in

Language: English - Date: 2013-06-08 22:50:08
939Security / Computer network security / Internet protocols / Wireless networking / IEEE 802.11i-2004 / IEEE 802.1X / Extensible Authentication Protocol / Wireless security / Supplicant / Computing / Cryptography / Cryptographic protocols

802.11i Authentication and Key Management (AKM) White Paper

Add to Reading List

Source URL: www.cwnp.com

Language: English - Date: 2013-09-16 20:04:37
940Public-key cryptography / Authentication / Message authentication code / Extensible Authentication Protocol / Kerberos / Cryptography / Security / DNP3

7 SECURE AUTHENTICATION 7.1

Add to Reading List

Source URL: www.dnp.org

Language: English - Date: 2011-11-09 02:21:06
UPDATE