Message authentication

Results: 402



#Item
261Inter-process communication / Open standards / Middleware / Advanced Message Queuing Protocol / WebSocket / Simple Authentication and Security Layer / OASIS / Computing / Message-oriented middleware / Network architecture

Advanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0 Committee Specification Draft 01 / Public Review Draft[removed]June 2014

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2014-06-10 12:00:00
262Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2011-04-20 04:03:50
263Computer security / Internet standards / Internet protocols / Directory services / Cryptographic protocols / Kerberos / Integrated Windows Authentication / Server Message Block / SPNEGO / Computing / Microsoft Windows / Computer network security

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-07-23 18:27:02
264Internet Explorer / Network file systems / Internet standards / Integrated Windows Authentication / NTLM / Server Message Block / Microsoft Media Server / WebDAV / Security Support Provider Interface / Computing / Computer network security / Internet protocols

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-05-08 17:52:57
265Yahoo! / Computing / DomainKeys Identified Mail / Data / Information / DomainKeys / Domain Name System / Author Domain Signing Practices / Email authentication / Spam filtering / Cryptographic protocols

DomainKeys Identified Mail (DKIM) Allows an organization to claim responsibility for transmitting a message, in a way that can be validated by a recipient

Add to Reading List

Source URL: dkim.org

Language: English - Date: 2009-07-12 13:08:00
266Demining / CMAC / Constellation Brands – Marvin Sands Performing Arts Center / Japan International Cooperation Agency / War / Mine action / Message authentication codes / Mine warfare

PDF Document

Add to Reading List

Source URL: www.jica.go.jp

Language: English - Date: 2012-09-19 07:21:56
267NIST hash function competition / Hashing / Message authentication codes / Keccak / SHA-2 / HMAC / SHA-1 / Skein / JH / Error detection and correction / Cryptography / Cryptographic hash functions

SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:22:44
268PKCS / ISO/IEC / FIPS 140-2 / FIPS 140 / Java Card / EMV / Subscriber identity module / Message authentication code / MIFARE / Cryptography / Cryptography standards / Smart cards

ID-One Cosmo 32 v5 FIPS[removed]Level 3 Security Policy Public Version Revision R01

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
269Cryptography standards / Cryptographic hash functions / Message authentication codes / Cryptographic software / HMAC / FIPS 140-2 / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Error detection and correction / Hashing

BitArmor Secure Cryptographic Engine Version 1.2 Security Policy v 1.1 BitArmor Systems, Inc 401 Liberty Avenue, Suite 1900

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-11 00:00:00
270FIPS 140-2 / Zeroisation / Block cipher modes of operation / Symmetric-key algorithm / Initialization vector / Key / Message authentication code / Data Encryption Standard / Cryptography / Key management / Advanced Encryption Standard

Security Policy: Digital Interface Unit Crypto Module (DIU CM) Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-11-06 00:00:00
UPDATE