Password authentication protocol

Results: 177



#Item
51Computational hardness assumptions / Diffie–Hellman key exchange / Diffie–Hellman problem / Weil pairing / ID-based encryption / Password authentication protocol / Public-key cryptography / Boneh/Franklin scheme / Cryptography / Cryptographic protocols / Finite fields

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
52Password / Security / Transaction authentication number / Data / Cryptographic protocols / Computer security / Challenge-response authentication

Security Analysis of A Remote User Authentication Protocol by Liao and Wang Dang Nguyen Duc∗,a , Kwangjo Kima a Auto-ID Lab Korea, Department of Information and Communications Engineering,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-09 03:45:40
53Privacy / Radio-frequency identification / Ubiquitous computing / Wireless / Data / Hamming weight / Authentication protocol / Password authentication protocol / Information / Computing / Automatic identification and data capture

Yet Another Ultralightweight Authentication Protocol that is Broken Gildas Avoine, Xavier Carpent Universit´e catholique de Louvain B-1348 Louvain-la-Neuve Belgium

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-09 06:16:06
54Data / Information / Secure communication / Internet standards / Electronic commerce / Transport Layer Security / Authentication protocol / Cipher suite / Password authentication protocol / Cryptographic protocols / Cryptography / Internet protocols

Generic Compilers for Authenticated Key Exchange∗ Tibor Jager Florian Kohlar Sven Sch¨age

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-02 08:15:58
55Cryptographic protocols / Cryptography / Public-key cryptography / Password authentication protocol

Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang1 and Xiaofeng Chen2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-19 03:05:28
56Technology / IEEE 802.1X / Computer security / IEEE 802.11 / Wireless LAN / Wireless access point / Password authentication protocol / Service set / Cracking of wireless networks / Computer network security / Wireless networking / Computing

802.11: Use, Misuse and the Need for a Robust Security Toolkit David Pollino Mike Schiffman

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-07 19:34:14
57Internet protocols / Network protocols / Tunneling protocols / Computer network security / Point-to-Point Tunneling Protocol / Internet standards / LM hash / Microsoft Point-to-Point Encryption / Password authentication protocol / Computing / Data / Network architecture

Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP) Bruce Schneier Counterpane Systems, 101 East Minnehaha Parkway,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
58Computer security / MS-CHAP / LM hash / Point-to-Point Tunneling Protocol / Password / Authentication protocol / Challenge-response authentication / NTLM / Cryptographic hash function / Cryptography / Computing / Internet protocols

Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Bruce Schneier Mudge Counterpane Systems L0pht Heavy Industries

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
59Information / Internet standards / Data transmission / Petroleum production / Separator / Communications protocol / Transmission Control Protocol / Password authentication protocol / Pointer / Computing / Data / Internet protocols

Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis ∗ Juan Caballero∗ , Heng Yin†∗ , Zhenkai Liang∗ , Dawn Song‡∗ Carnegie Mellon University † College of William and Ma

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
60Directory services / Password / Lightweight Directory Access Protocol / Authentication / Computing / Internet / Security / Internet protocols / Internet standards

Stanford University July 26, 2014 Wallet Secure Data Distribution and Management

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
UPDATE