Message authentication

Results: 402



#Item
161Computing / Computer-mediated communication / Strikeiron / Email spam / Spam / Anti-spam techniques / Email authentication / Internet / Spamming / Email

Woman reading text message outdoors

Add to Reading List

Source URL: www.strikeiron.com

Language: English - Date: 2014-07-03 09:14:57
162Post Office Protocol / STARTTLS / Simple Mail Transfer Protocol / SMTP Authentication / Message transfer agent / Webmail / Port / Email / Computer-mediated communication / Computing

Important facts in a nutshell regarding your account Your user name A user name (e.g., "mueller") will be assigned to you when you activate your account. You will need it to access the university network. If you have for

Add to Reading List

Source URL: portal-o.hm.edu

Language: English - Date: 2013-11-24 16:12:22
163Computing / Telecommunications engineering / Ecma International / Near field communication / Message authentication code / ISO/IEC 14443 / ISO JTC 1/SC 27 / Office Open XML / Technology / Standards organizations / ISO standards

ECMA-411 1st Edition / December 2014 NFC-SEC-04: NFC-SEC Entity Authentication and Key

Add to Reading List

Source URL: www.ecma-international.org

Language: English - Date: 2014-12-11 03:31:42
164Ecma International / CMAC / Computer file formats / Evaluation / Reference / ISO standards / Standards organizations / Message authentication codes / Computing

ECMA-409 1st Edition / December 2014 NFC-SEC-02: NFC-SEC Cryptography Standard using

Add to Reading List

Source URL: www.ecma-international.org

Language: English - Date: 2014-12-11 03:31:40
165Poly1305-AES / Block cipher / VMAC / Advanced Encryption Standard / Tiny Encryption Algorithm / CBC-MAC / ARIA / Q / Triple DES / Cryptography / Message authentication codes / CMAC

An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-11 11:03:47
166Internet Message Access Protocol / Secure Password Authentication / Message transfer agent / Gmail / Email client / Simple Mail Transfer Protocol / Computing / Email / Computer-mediated communication

Outlook 2010 IMAP/POP Configuration for UB E-mail (Faculty & Staff) Note: IMAP accounts can also be added from Start > Control Panel > Mail > E-mail Accounts > New 1. Open Outlook[removed]Click the File tab or the Offic

Add to Reading List

Source URL: www.ubalt.edu

Language: English - Date: 2012-03-05 09:47:57
167Cryptographic hash functions / Hashing / SHA-2 / Transport Layer Security / SHA-1 / HMAC / Message authentication code / Collision attack / Key size / Cryptography / Cryptographic protocols / Internet protocols

Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Add to Reading List

Source URL: systems.hscic.gov.uk

Language: English
168Cryptography / Cryptographic hash functions / Finite fields / Hashing / Polynomials / Cyclic redundancy check / Polynomial code / Universal hashing / Polynomial / Mathematics / Error detection and correction / Algebra

1 Cryptographically Secure CRC for Lightweight Message Authentication Elena Dubrova∗ , Mats N¨aslund† , G¨oran Selander† , Fredrik Lindqvist† ∗ Royal

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 04:13:19
169Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / HMAC / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 4500 FIPS[removed]Security Policy v2-4v2 with gtk comments.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 17:35:30
170Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / Cryptographic Module Validation Program / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 3820 FIPS[removed]Security Policy v2-3.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 14:34:44
UPDATE