Password authentication protocol

Results: 177



#Item
41Internet protocols / Data / Cryptographic software / Computer network security / Skype / Password / Extensible Authentication Protocol / RADIUS / Two-factor authentication / Computing / Internet standards / Internet

S HAR EPLAN T E C HN I CA L SPEC IFICATIO N S Security

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-04-27 09:38:13
42Computer network security / Wireless networking / Two-factor authentication / Kerberos / Password / Authentication / Wireless sensor network / Security / Cryptography / Computer security

1 Improvement of Das’s Two-Factor Authentication Protocol in Wireless Sensor Networks DaeHun Nyang and Mun-Kyu Lee

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-21 03:25:04
43Computer network security / Internet protocols / Self-certifying File System / Password authentication protocol / Security token / Kerberos / Access token / Password / RADIUS / Computing / Computer security / Microsoft Windows

To appear in the 19th ACM Symposium on Operating Systems Principles (SOSP ’03) Decentralized User Authentication in a Global File System Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek MIT Comput

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2003-08-31 20:05:26
44Network architecture / Internet standards / Telnet / Password / Secure Shell / SAINT / Transmission Control Protocol / File Transfer Protocol / Basic access authentication / Computing / Internet / Internet protocols

ABC Coffee ASV Vulnerability Details Report Generated: April 18, 2014 Part 1. Scan Information Scan Customer Company: ABC Coffee Shop Date scan was completed: April 17, 2014

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2014-04-22 13:49:11
45Computing / Password authentication protocol / Transmission Control Protocol / Public-key cryptography / Authentication / Denial-of-service attack / Message authentication code / Wireless sensor network / Man-in-the-middle attack / Cryptography / Computer network security / Cyberwarfare

Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:13
46Wi-Fi / Protected Extensible Authentication Protocol / Technology / Eduroam / Telecommunications engineering / Password / Extensible Authentication Protocol / Comparison of wireless LAN clients / Computer network security / Wireless networking / Computing

Microsoft Word#Eduroam Wireless Setup for Microsoft Windows 7.DOCX

Add to Reading List

Source URL: icts.unsw.adfa.edu.au

Language: English - Date: 2015-02-23 19:47:14
47Public-key cryptography / Password authentication protocol / Key-agreement protocol / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Encrypted key exchange

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-13 20:50:57
48Data / Internet protocols / Universal composability / Authentication protocol / Password authentication protocol / Radio-frequency identification / Cryptography / Cryptographic protocols / Information

Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros Department of Computer Science, Florida State University Tallahassee, Florida, FL

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-05 18:44:49
49Universal composability / Authentication protocol / Password authentication protocol / Secure multi-party computation / Integrated Windows Authentication / Authentication / Password / Man-in-the-middle attack / Kerberos / Cryptography / Cryptographic protocols / Security

Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-20 14:16:00
50Password authentication protocol / Password / Cryptographic nonce / Information / Cryptographic protocols / Security / Internet protocols / Computer security

Cryptanalysis of the Yang -Wang’s password authentication schemes Jue-Sam Chou1, Ming-De Yang2, Guey-Chuen Lee3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-23 03:33:04
UPDATE