Message authentication

Results: 402



#Item
171Cyberwarfare / NTLM / Integrated Windows Authentication / Server Message Block / LAN Manager / Cryptographic nonce / Authentication protocol / Challenge-response authentication / Windows / Computing / Computer security / Computer network security

Understanding the Windows SMB NTLM Authentication Weak Nonce Vulnerability Hernan Ochoa

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:52:55
172Block cipher / Cipher / Initialization vector / Feistel cipher / Cryptographic hash function / Key / Stream cipher / Public-key cryptography / Message authentication code / Cryptography / Key management / Symmetric-key algorithm

Chapter Cryptographic Tools and Techniques 1

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-12-25 07:16:38
173Message authentication codes / HMAC / Hashing / Advanced Encryption Standard / FIPS 140 / Key / Transport Layer Security / Cryptography / Cryptography standards / Cryptographic protocols

Barco ICMP FIPS[removed]Non-Proprietary Security Policy ICMP Barco ICMP FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:48:39
174Notary / Two-factor authentication / Authentication / Digital signature / Cryptography / Security / Civil law

FIDO U2F Raw Message Formats FIDO Alliance Proposed Standard 09 October 2014 This version: http://www.fidoalliance.org/specs/fido­u2f­raw­message­formats­v1.0­ps­[removed]html Previous version: http://

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-12-09 14:43:41
175Cryptographic protocols / Email / Computing / Computer-mediated communication / Spamming / Spam filtering / Email authentication / Computer security

MN MESSAGE SENDER CERTIFICATION Everbridge MN Message Sender Certification enables users to demonstrate their knowledge of the range of features in Everbridge Mass Notification, how to use them, and the best practices f

Add to Reading List

Source URL: fbf1c3d6e5ac90240faf-0357db950fbb26a08f45323bec4b9c51.r77.cf2.rackcdn.com

Language: English - Date: 2014-08-20 10:39:23
176Message authentication codes / Advanced Encryption Standard / FIPS 140-2 / SHA-2 / HMAC / FIPS 140 / Block cipher / Crypto++ / AES implementations / Cryptography / Cryptography standards / Cryptographic software

QTI Cryptographic Module on Crypto 5 Core FIPS[removed]Security Policy Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-31 08:48:13
177One-key MAC / Ballston–MU / Washington /  D.C. / Message authentication codes / Pennsylvania Avenue / Foggy Bottom

Effective[removed]How to use this timetable ➤ Use the map to find the stops closest to where you will get on and off the bus. ➤ Select the schedule (Weekday,

Add to Reading List

Source URL: www.wmata.com

Language: English - Date: 2014-11-25 09:58:21
178Cryptographic protocols / Email authentication / Email / Internet standards / S/MIME / X.509 / Cryptographic Message Syntax / MIME / PKCS / Cryptography / Public-key cryptography / Computing

Secure Electronic Mail: It’s Ready for Prime Time Panel Chair Russell Housley, SPYRUS Panelists John Pawling, J.G. Van Dyke & Associates Michael Elkins, Network Associates, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
179Email authentication / Internet privacy / Key management / Kerberos / Message authentication code / Password / S/MIME / Digital signature / Cryptographic hash function / Cryptography / Computer security / Public-key cryptography

Young, A., Kirstein, P. and Ibbetson, A[removed]Technologies to Support Authentication in Higher Education : A Study for the UK Joint Information Systems Committee, August 21th, 1996. Other. UKOLN, University of Bath, Ba

Add to Reading List

Source URL: opus.bath.ac.uk

Language: English - Date: 2014-12-16 19:39:40
180Computing / Crime prevention / National security / Computer network security / Password / Information security / Authentication / Message transfer agent / Computer security / Email / Security / Computer-mediated communication

US COAST GUARD COMPUTER SECURITY (COMPSEC) BRIEFING This brief outlines Information Systems Security (IS) security practices that are applicable to all SW III users. Each user shall adhere to these practices while using

Add to Reading List

Source URL: auxdata.uscg.gov

Language: English - Date: 2009-04-29 10:45:00
UPDATE