Key authentication

Results: 993



#Item
971Atmel AVR / Symmetric-key algorithm / Padding / Advanced Encryption Standard / CMAC / Cipher / Key size / Cryptography / Message authentication codes / Key management

AVR411: Secure Rolling Code Algorithm for Wireless Link Features

Add to Reading List

Source URL: www.atmel.com

Language: English - Date: 2012-12-08 06:56:50
972Access control / Authentication / Packaging / Digital Transmission Content Protection / Digital signature / Cryptography / Notary / Public-key cryptography

Microsoft Word - Camera_Readey_Security_Analysis_of_DTCP_for_SAM06.doc

Add to Reading List

Source URL: ww1.ucmss.com

Language: English - Date: 2006-04-01 05:14:45
973Advanced Access Content System / Broadcast encryption / Public-key cryptography / Blu-ray Disc / Content Protection for Recordable Media / Authentication / Content Scramble System / Cryptography / Digital rights management / DVD

PDF Document

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:14
974Key management / Cryptographic protocols / Vehicular communication systems / Digital signature / Vehicular ad-hoc network / Secure Real-time Transport Protocol / Extensible Authentication Protocol / Cryptography / Wireless networking / Public-key cryptography

Microsoft Word - Contents-Bangkok08-5.doc

Add to Reading List

Source URL: www.waset.org

Language: English - Date: 2013-02-02 13:01:45
975PGP / Cryptographic software / Public-key cryptography / Cross-platform software / Email authentication / GNU Privacy Guard / Enigmail / Email encryption / Pretty Good Privacy / Cryptography / Software / Computer security

PDF Document

Add to Reading List

Source URL: www.enigmail.net

Language: English
976Surveillance / Fingerprint recognition / Fingerprint / Minutiae / Public key fingerprint / Authentication / Fprint / Automated fingerprint identification / Fingerprint SDK / Biometrics / Fingerprints / Security

PDF Document

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2008-12-09 13:46:07
977Computer network security / Computing / IEEE 802.11 / IEEE 802.11i-2004 / Wi-Fi Protected Access / Wired Equivalent Privacy / Extensible Authentication Protocol / Temporal Key Integrity Protocol / CCMP / Cryptography / Cryptographic protocols / Wireless networking

PDF Document

Add to Reading List

Source URL: www.freewebs.com

Language: English
978IEEE 802.11 / Key management / Secure communication / Temporal Key Integrity Protocol / CCMP / Wired Equivalent Privacy / IEEE 802.11i-2004 / Extensible Authentication Protocol / RC4 / Cryptography / Cryptographic protocols / Wireless networking

PDF Document

Add to Reading List

Source URL: wiki-files.aircrack-ng.org

Language: English - Date: 2012-12-01 17:41:52
979Access control / Key management / Cryptographic protocols / Internet protocols / X.509 / Authentication / Authorization / Atomic authorization / Public key certificate / Cryptography / Security / Public-key cryptography

PDF Document

Add to Reading List

Source URL: mason.gmu.edu

Language: English - Date: 2009-03-15 13:49:00
980Challenge-response authentication / PUF / Hash function / Public-key cryptography / Integrated circuit / Cryptography / Randomness / Physical Unclonable Function

PDF Document

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2007-02-06 13:27:01
UPDATE