Key distribution

Results: 988



#Item
51Computer network security / NT LAN Manager / Kerberos / Integrated Windows Authentication / Authentication protocol / Challengeresponse authentication / Password / Cain and Abel / Key distribution center / Electronic authentication / Brute-force attack / Pass the hash

Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

Add to Reading List

Source URL: hdm.io

Language: English - Date: 2015-12-05 20:38:27
52Cryptography / Post-quantum cryptography / Learning with errors / Lattice-based cryptography / Quantum computing / Normal distribution / Probability distribution / XTR / Lattice / Public-key cryptography / Transport Layer Security / Ideal lattice cryptography

Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2015-12-08 11:13:38
53Access control / Nuclear command and control / Two-man rule

Local Policy on Key Distribution 1.0 Policy It is recognized that keys to the union office need to be distributed to specific members

Add to Reading List

Source URL: 2424.cupe.ca

Language: English - Date: 2013-03-01 12:17:20
54Wireless networking / Wireless sensor network / Cryptographic protocols / Key management / Code division multiple access / Bootstrapping Server Function / Key distribution / Generic Bootstrapping Architecture / Authentication and Key Agreement / ZigBee / Lightweight Extensible Authentication Protocol / ANT

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-23 01:39:57
55Computer network security / Key management / Authentication protocols / Kerberos / Key distribution center / Ticket Granting Ticket / Ticket / Shared secret / NT LAN Manager / Authentication server

-- -- The Evolution of the Kerberos Authentication Service John T. Kohl

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2004-04-08 15:18:56
56Quantum information science / Quantum cryptography / Quantum mechanics / Emerging technologies / Quantum computing / Quantum entanglement / Quantum key distribution / Repeater / Quantum teleportation / Squeezed coherent state / Quantum optics / Quantum network

FACULTY OF SCIENCE UNIVERSITY OF COPENHAGEN Master’s thesis Johannes Borregaard

Add to Reading List

Source URL: theoretical-quantum-optics.nbi.ku.dk

Language: English - Date: 2015-09-01 09:58:36
57Wireless networking / Wireless sensor network / Computer networking / Sensor node / Reliability engineering / Energy harvesting / Verification and validation / Systems engineering / Key distribution in wireless sensor networks / Virtual sensor network

PS-1 Ultra Low-Power High-Speed Flexible Probabilistic Adder for Error-Tolerant Applications

Add to Reading List

Source URL: www.bpti.lt

Language: English - Date: 2013-12-16 08:28:50
58Quantum cryptography / Cryptography / Quantum information science / Photodetectors / Quantum key distribution / Optical devices / ID Quantique / SARG04 / Photon / Photodiode

arXiv:1008.4593v2 [quant-ph] 4 MarHacking commercial quantum cryptography systems by tailored bright illumination Lars Lydersen,1, 2, a) Carlos Wiechers,3, 4, 5 Christoffer Wittmann,3, 4 Dominique Elser,3, 4 Johan

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2011-03-06 20:33:07
59Quantum information science / Quantum computing / Quantum cryptography / Emerging technologies / Theoretical computer science / Quantum complexity theory / Quantum information / Quantum algorithm / BQP / Quantum entanglement / Quantum key distribution / Umesh Vazirani

LA-URTheory Component of the Quantum Information Processing

Add to Reading List

Source URL: qist.lanl.gov

Language: English - Date: 2004-04-06 17:14:00
60Wireless networking / Vehicular ad hoc network / Wireless ad hoc network / Vehicular communication systems / Vehicle-to-vehicle / Public-key cryptography / Key distribution / Key management / Techniques for Verification of Broadcast Information in Vehicular Ad hoc Networks

Low-complexity secret key distribution for Vehicular Networks Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and Jo˜ao Barros∗ ∗ Instituto de Telecomunicac¸o˜ es, Departamento de Engenharia Electr

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:53:05
UPDATE