<--- Back to Details
First PageDocument Content
Federated identity / Authentication / Notary / Packaging / Phishing / Mutual authentication / Password authentication protocol / Two-factor authentication / HTTP+HTML form-based authentication / Security / Computer security / Access control
Date: 2014-11-24 13:14:40
Federated identity
Authentication
Notary
Packaging
Phishing
Mutual authentication
Password authentication protocol
Two-factor authentication
HTTP+HTML form-based authentication
Security
Computer security
Access control

Microsoft Word - NeAF BPG Vol 2.doc

Add to Reading List

Source URL: www.finance.gov.au

Download Document from Source Website

File Size: 329,99 KB

Share Document on Facebook

Similar Documents

Computer access control / Computer security / Computing / Security token / Multi-factor authentication / Authentication / RSA SecurID / Mutual authentication / OAuth / OpenID / Electronic authentication / Extensible Authentication Protocol

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

DocID: 1qWyZ - View Document

Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

DocID: 1qW6S - View Document

Cryptography / Cryptographic hash functions / Error detection and correction / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / SHA-2 / Hash function / SHA-1 / Block cipher / Galois/Counter Mode

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

DocID: 1qPG1 - View Document

Automatic identification and data capture / Identifiers / Privacy / Radio-frequency identification / Ubiquitous computing / Wireless / EPCglobal / Cyclic redundancy check / TIFF / Computing

Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard Pedro Peris-Lopez1 Tieyan Li2 Tong-Lee Lim2 Julio C. Hernandez-Castro1 Juan M. Estevez-Tapiador1 1 Computer

DocID: 1qDUv - View Document

Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

DocID: 1qep0 - View Document