Message authentication code

Results: 79



#Item
21Committee: (CS1) - Cyber Security  National Designation Title

Committee: (CS1) - Cyber Security National Designation Title

Add to Reading List

Source URL: www.incits.org

Language: English - Date: 2015-02-06 20:48:34
22RSA Laboratories Volume 5, No. 2, Summer / Fall 2002 CONTENTS I.

RSA Laboratories Volume 5, No. 2, Summer / Fall 2002 CONTENTS I.

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2013-08-15 00:54:53
23Practical Broadcast Authentication in Sensor Networks ∗ Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dliu,pning}@ncsu.edu

Practical Broadcast Authentication in Sensor Networks ∗ Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dliu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
24Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗  Peng Ning†

Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗ Peng Ning†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
25FIPS PUB 198 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC)

FIPS PUB 198 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC)

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:56:45
26Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:27
27##############################################################  Keyed-Hash Message Authentication Code (HMAC) Hashlen = 224 ############################################################## Key length = 64

############################################################## Keyed-Hash Message Authentication Code (HMAC) Hashlen = 224 ############################################################## Key length = 64

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:49:28
28The CRIME attack  HTTPS:// Secure HTTP HTTPS provides: ● Confidentiality (Encryption), ● Integrity (Message Authentication Code),

The CRIME attack HTTPS:// Secure HTTP HTTPS provides: ● Confidentiality (Encryption), ● Integrity (Message Authentication Code),

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2012-09-26 10:02:07
29Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du

Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:13
30Cryptographic Support for Secure Logs on Untrusted Machines Bruce Schneier John Kelsey {schneier,kelsey}@counterpane.com Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419

Cryptographic Support for Secure Logs on Untrusted Machines Bruce Schneier John Kelsey {schneier,kelsey}@counterpane.com Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31