Key distribution center

Results: 73



#Item
1Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

Add to Reading List

Source URL: hdm.io

Language: English - Date: 2015-12-05 20:38:27
2--  -- The Evolution of the Kerberos Authentication Service John T. Kohl

-- -- The Evolution of the Kerberos Authentication Service John T. Kohl

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2004-04-08 15:18:56
3AD Integration options for Linux Systems Overview Dmitri Pal Developer Conference. Brno. 2013

AD Integration options for Linux Systems Overview Dmitri Pal Developer Conference. Brno. 2013

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-10-17 03:55:39
4High-Speed FPGA Implementation of LDPC Decoder for Quantum Key Distribution  Kazuaki Doi Corporate Research & Development Center, Toshiba Corporation, 1, Komukai Toshiba-cho, Kawasaki-shi, Japan  Abstract:In research o

High-Speed FPGA Implementation of LDPC Decoder for Quantum Key Distribution Kazuaki Doi Corporate Research & Development Center, Toshiba Corporation, 1, Komukai Toshiba-cho, Kawasaki-shi, Japan Abstract:In research o

Add to Reading List

Source URL: 2015.qcrypt.net

Language: English - Date: 2015-09-22 01:51:38
    5SAFEGUARDING QUANTUM KEY DISTRIBUTION THROUGH DETECTION RANDOMIZATION Thiago Ferreira da Silva1,2,*, Gustavo C. do Amaral¹, Guilherme B. Xavier³, Guilherme P. Temporão¹, and Jean Pierre von der Weid¹ ¹ Center for T

    SAFEGUARDING QUANTUM KEY DISTRIBUTION THROUGH DETECTION RANDOMIZATION Thiago Ferreira da Silva1,2,*, Gustavo C. do Amaral¹, Guilherme B. Xavier³, Guilherme P. Temporão¹, and Jean Pierre von der Weid¹ ¹ Center for T

    Add to Reading List

    Source URL: 2015.qcrypt.net

    Language: English - Date: 2015-09-22 01:49:28
      6Multi-partite squash operation and its application to device-independent quantum key distribution Toyohiro Tsurumaru1 and Tsubasa Ichikawa2 1  Mitsubishi Electric Corporation, Information Technology R&D Center,

      Multi-partite squash operation and its application to device-independent quantum key distribution Toyohiro Tsurumaru1 and Tsubasa Ichikawa2 1 Mitsubishi Electric Corporation, Information Technology R&D Center,

      Add to Reading List

      Source URL: 2015.qcrypt.net

      Language: English - Date: 2015-09-22 01:45:25
        7Stealing credentials for impersonation Emmanuel Bouillon  October 29, 2010  Introduction

        Stealing credentials for impersonation Emmanuel Bouillon October 29, 2010 Introduction

        Add to Reading List

        Source URL: archive.hack.lu

        Language: English - Date: 2010-10-29 15:08:35
        8Quantum key distribution with floating bases and decoy states Yu.V. Kurochkin, A.K. Fedorov, and V.L. Kurochkin Russian Quantum Center, Skolkovo, Moscow, Russia Abstract In view of breaking public-key encryption a

        Quantum key distribution with floating bases and decoy states Yu.V. Kurochkin, A.K. Fedorov, and V.L. Kurochkin Russian Quantum Center, Skolkovo, Moscow, Russia Abstract In view of breaking public-key encryption a

        Add to Reading List

        Source URL: 2015.qcrypt.net

        Language: English - Date: 2015-09-22 01:51:04
          9Round-robin differential phase-shift quantum key distribution protocol with threshold detectors Toshihiko Sasaki1 and Masato Koashi1 1  Photon Science Center, Graduate School of Engineering,

          Round-robin differential phase-shift quantum key distribution protocol with threshold detectors Toshihiko Sasaki1 and Masato Koashi1 1 Photon Science Center, Graduate School of Engineering,

          Add to Reading List

          Source URL: 2015.qcrypt.net

          Language: English - Date: 2015-09-22 01:50:40
            10Stayin’ Alive: Aliveness as an alternative to authentication Jonathan Anderson and Robert N M Watson University of Cambridge Computer Laboratory {jonathan.anderson,robert.watson}@cl.cam.ac.uk

            Stayin’ Alive: Aliveness as an alternative to authentication Jonathan Anderson and Robert N M Watson University of Cambridge Computer Laboratory {jonathan.anderson,robert.watson}@cl.cam.ac.uk

            Add to Reading List

            Source URL: www.cl.cam.ac.uk

            Language: English - Date: 2012-11-30 15:52:29