Key authentication

Results: 993



#Item
961Portable software / Cryptographic protocols / Online chat / Internet privacy / Cryptographic software / Off-the-Record Messaging / Authentication / Public key fingerprint / Pidgin / Software / Cryptography / Computing

A User Study of Off-the-Record Messaging Ryan Stedman

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2008-05-23 10:26:27
962Hashing / Message authentication codes / Coding theory / HMAC / SHA-2 / MD5 / Key derivation function / Collision attack / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-12-17 12:00:22
963Cryptography / Fingerprints / Fingerprint / Fingers / Human anatomy / Authentication / Public key fingerprint / Two-factor authentication / Security / Biometrics / Identification

ITU-T Workshop on Security, Seoul Importance of Open Discussion on

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2004-11-30 17:33:14
964Computer security / Kerberos / Ticket Granting Ticket / Key distribution center / Single sign-on / Authentication server / Ticket / Secure Shell / Network Information Service / Computing / Computer network security / Cryptography

The MIT Kerberos Administrator’s How-to Guide Protocol, Installation and Single Sign On By Jean-Yves Migeon

Add to Reading List

Source URL: www.kerberos.org

Language: English - Date: 2008-07-23 12:35:04
965Cryptography / Identification / Fingers / Human anatomy / Card reader / Authentication / Public key fingerprint / Integrated Automated Fingerprint Identification System / Fingerprints / Security / Biometrics

4th Australian Information Warfare and IT Security Conference[removed]Fooling Fingerprint Scanners - Biometric Vulnerabilities of the

Add to Reading List

Source URL: www.stdot.com

Language: English - Date: 2003-12-05 04:59:34
966Computer network security / IEEE 802.11 / Computing / Technology / Wi-Fi / Wi-Fi Protected Access / IEEE 802.11i-2004 / Extensible Authentication Protocol / Temporal Key Integrity Protocol / Cryptographic protocols / Wireless networking / Cryptography

Q&A WPA2™

Add to Reading List

Source URL: www.wi-fi.org

Language: English - Date: 2010-06-05 11:49:43
967Key management / Cryptographic hash function / PKCS / Digital signature / Symmetric-key algorithm / Public key infrastructure / Block cipher / Microsoft CryptoAPI / Information security / Cryptography / Public-key cryptography / Message authentication codes

A Companion to User’s Guide to Cryptography and Standards Alexander W. Dent

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-03-20 11:00:00
968Semantic security / Chosen-ciphertext attack / Symmetric-key algorithm / Block cipher modes of operation / Message authentication code / Authenticated encryption / Ciphertext / Malleability / Secure Shell / Cryptography / Ciphertext indistinguishability / Chosen-plaintext attack

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-25 00:57:52
969Computing / Email authentication / Public-key cryptography / Cryptographic software / PGP / Pretty Good Privacy / Email encryption / Hushmail / S/MIME / Cryptography / Internet privacy / Internet

Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted E-Mail Shirley Gaw

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2006-02-01 16:05:32
970Cryptographic hash functions / HMAC / Key / Symmetric-key algorithm / SHA-2 / Ciphertext / Public-key cryptography / Index of cryptography articles / Book:Cryptography / Cryptography / Message authentication codes / Hashing

Everything you need to know about cryptography in 1 hour

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2011-07-30 14:49:49
UPDATE