Key authentication

Results: 993



#Item
1

A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012 Stig F. Mjølsnes

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:12
    2

    IBM Ported Tools for z/OS: OpenSSH Key Authentication June 12,2012 Kirk Wolf Steve Goetze http://dovetail.com

    Add to Reading List

    Source URL: dovetail.com

    - Date: 2012-06-14 11:36:21
      3

      A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1 2

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2014-09-17 07:10:18
        4

        Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

        Add to Reading List

        Source URL: liu.diva-portal.org

        - Date: 2013-04-18 05:30:18
          5

          Direct proof of security of Wegman-Carter authentication with partially known key Aysajan Abidin and Jan-Åke Larsson Linköping University Post Print

          Add to Reading List

          Source URL: liu.diva-portal.org

          - Date: 2014-11-19 10:41:40
            6

            Strengthening Public Key Authentication against Key Theft Short Paper Martin Kleppmann1 and Conrad Irwin2 1

            Add to Reading List

            Source URL: martin.kleppmann.com

            - Date: 2016-08-24 14:47:03
              7Cryptography / Public key infrastructure / Cryptographic software / Email authentication / Key management / Email encryption / Public-key cryptography / S/MIME / Key / Encryption / Email / Pretty Good Privacy

              Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

              Add to Reading List

              Source URL: cups.cs.cmu.edu

              Language: English - Date: 2006-06-02 21:42:44
              8Cryptography / Public-key cryptography / Key management / Public key infrastructure / Authentication / Computer access control / Key server / Public key fingerprint / Public key certificate / Key / Pretty Good Privacy

              Network Working Group Request for Comments: 2726 Category: Standards Track J. Zsako BankNet

              Add to Reading List

              Source URL: www.rfc-editor.org

              Language: English - Date: 2002-03-27 15:35:49
              9Cryptography / Public-key cryptography / IP / Undeniable signature / Digital signature / Challengeresponse authentication / David Chaum / Cryptographic hash function / RSA

              l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

              Add to Reading List

              Source URL: www.chaum.com

              Language: English - Date: 2015-05-26 20:08:31
              10Cryptography / Computer security / Security / Computer access control / Challengeresponse authentication / Password / Cryptographic nonce / Authentication / Server / Biometrics / Key / Public-key cryptography

              WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult

              Add to Reading List

              Source URL: vast.uccs.edu

              Language: English - Date: 2013-12-13 13:04:18
              UPDATE