SecurID

Results: 158



#Item
151Cryptography / Password / Authentication / One-time password / Multi-factor authentication / Keystroke dynamics / SecurID / Software token / Secure Shell / Security / Computer security / Access control

Authentication Methods and Techniques Christopher Mallow

Add to Reading List

Source URL: www.giac.org

Language: English - Date: 2011-03-10 11:21:17
152Software / VMware / Computer network security / Data management / Public records / SecurID / RSA / Netwitness / Copyright law of the United States / EMC Corporation / Computing / Cryptography

Trust in the Cloud Zajištění bezpečnosti virtuálního datacentra a jeho souladu s předpisy

Add to Reading List

Source URL: www.bezpecnostvcloudu.cz

Language: English - Date: 2012-05-15 05:33:47
153Search algorithms / Cryptographic hash functions / EMC Corporation / SecurID / Hash function / Hash list / Hashing / Error detection and correction / Cryptography

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yinini

Add to Reading List

Source URL: www.crypto-world.com

- Date: 2011-04-01 07:21:47
154Cruzer Enterprise / Central Management and Control / SanDisk / USB flash drive / SecurID / Windows Server / CMC / Windows Vista / Universal Serial Bus / USB / Computer hardware / Computing

[removed]

Add to Reading List

Source URL: www.sandisk.com

Language: English - Date: 2009-07-21 06:16:06
155Tamper resistance / Hardware security module / Secure cryptoprocessor / Smart card / Power analysis / SecurID / Trusted Platform Module / Public-key cryptography / IBM / Cryptography / Espionage / Technology

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-04-08 09:15:29
156Advanced Encryption Standard / Message authentication codes / Hashing / SecurID / ICE / VEST / Hash function / Lookup table / Hamming weight / Cryptography / Cryptographic hash functions / Stream ciphers

PDF Document

Add to Reading List

Source URL: palms.ee.princeton.edu

Language: English - Date: 2004-10-22 10:04:33
157Differential cryptanalysis / SecurID / Advantage / Avalanche effect / Key schedule / Block ciphers / Khufu and Khafre / Cryptography / Advanced Encryption Standard / ICE

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-10-29 07:31:26
158Hashing / Search algorithms / Stream ciphers / SecurID / ICE / Hash function / Lookup table / VEST / Cryptography / Advanced Encryption Standard / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-10-21 00:23:09
UPDATE