Message authentication

Results: 402



#Item
71Spam filtering / Computer-mediated communication / Cryptographic protocols / Yahoo! / DomainKeys Identified Mail / SMTP Authentication / Simple Mail Transfer Protocol / Sender Policy Framework / Vouch by Reference / Email authentication / Email / Computing

draft-ietf-appsawg-rfc7001bis-07 - Message Header Field for Indicating Message Authentication Status

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-22 05:04:16
72Network protocols / Internet protocols / Secure multicast / Data transmission / IP multicast / Transmission Control Protocol / Public-key cryptography / Message authentication code / Communications protocol / Data / Information / Network architecture

Efficient and Secure Source Authentication for Multicast Adrian Perrig  Ran Canetti

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:22:53
73Computer security / Kerberos / Key distribution center / Single sign-on / Ticket Granting Ticket / Ticket / Authentication server / Authentication / Server Message Block / Computer network security / Cryptography / Computing

NIST PKI06: Integrating PKI and Kerberos

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-04-24 17:53:50
74HMAC / Transmission Control Protocol / SCADA / Public-key cryptography / Block cipher modes of operation / Key / Cipher / Cryptography / Message authentication codes / Hashing

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
75Hashing / Message authentication codes / Search algorithms / Cryptographic hash function / Public-key cryptography / Random number generation / PUF / Hash function / One-way function / Cryptography / Randomness / Physical Unclonable Function

Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-13 19:26:58
76Computing / Data security / ISO/IEC 27001 / ISO/IEC 27005 / Message authentication code / Information security / International Committee for Information Technology Standards / Common Criteria / International Organization for Standardization / Computer security / Standards organizations / Security

Committee: (CS1) - Cyber Security National Designation Title

Add to Reading List

Source URL: www.incits.org

Language: English - Date: 2015-02-06 20:48:34
77Internet protocols / Data transmission / Communications protocol / Protocols / Transmission Control Protocol / IP multicast / Public-key cryptography / Message authentication code / Authentication / Cryptography / Data / Information

RSA Laboratories Volume 5, No. 2, Summer / Fall 2002 CONTENTS I.

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2013-08-15 00:54:53
78Communications protocol / ANT / Key distribution / Man-in-the-middle attack / Cryptography / Public-key cryptography / Message authentication code

Practical Broadcast Authentication in Sensor Networks ∗ Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dliu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
79Hashing / Message authentication codes / Search algorithms / Hash function / SHA-2 / Crypt / SHA-1 / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Cryptography

Lecture 15: Hashing for Message Authentication Lecture Notes on “Computer and Network Security” by Avi Kak () April 30, 2015 3:29pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-30 15:30:26
80Distributed data storage / Cryptographic hash function / Wireless sensor network / Denial-of-service attack / Man-in-the-middle attack / Onion routing / Cryptography / Public-key cryptography / Message authentication code

Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗ Peng Ning†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
UPDATE