Password authentication protocol

Results: 177



#Item
171Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Key management / Perfect forward secrecy / Password authentication protocol / Man-in-the-middle attack / YAK / SILC / Cryptography / Cryptographic protocols / MQV

Overview of Key Agreement Protocols Ratna Dutta and Rana Barua Stat-Math Unit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-10-04 07:51:24
172Public-key cryptography / Access control / ISO standards / Ubiquitous computing / Smart card / Authentication protocol / Public key infrastructure / Subscriber identity module / Password authentication protocol / Cryptography / Security / Cryptographic protocols

LNCS[removed]Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card

Add to Reading List

Source URL: researcher.watson.ibm.com

Language: English - Date: 2010-04-12 17:49:56
173Internet protocols / Wireless / Information / Security / Challenge-response authentication / Password authentication protocol / Authentication protocol / Automatic identification and data capture / Computing / Radio-frequency identification

The Swiss-Knife RFID Distance Bounding Protocol Chong Hee Kim , Gildas Avoine, Fran¸cois Koeune , Fran¸cois-Xavier

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2011-02-26 09:55:10
174Internet protocols / Computer network security / HOTP / One-time password / Two-factor authentication / Password authentication protocol / Password / Authentication server / Authentication / Computer security / Security / Cryptography

HOTP-Based User Authentication Scheme in Home Networks Binod Vaidya1 , Jong Hyuk Park2 , and Joel J.P.C. Rodrigues3

Add to Reading List

Source URL: netgna.it.ubi.pt

Language: English - Date: 2011-03-16 07:13:06
175Cryptography / MS-CHAP / Point-to-Point Tunneling Protocol / Password / Challenge-response authentication / Authentication protocol / Crypt / LM hash / NTLM / Computing / Computer security / Internet protocols

Exploiting known security holes in Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Jochen Eisinger

Add to Reading List

Source URL: penguin-breeder.org

Language: English - Date: 2003-02-21 09:40:07
176Security / Password / Challenge-response authentication / Digest access authentication / Secure Remote Password protocol / Man-in-the-middle attack / Zero-knowledge proof / OTPW / Security token / Cryptography / Cryptographic protocols / Computer security

PDF Document

Add to Reading List

Source URL: drmlab.org

Language: English - Date: 2008-12-04 05:05:52
UPDATE