Authentication protocols

Results: 771



#Item
41

Accountability Protocols: Formalized and Verified Giampaolo Bella, Universit`a di Catania Lawrence C. Paulson, University of Cambridge Classical security protocols aim to achieve authentication and confidentiality under

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-01-25 05:41:22
    42Key management / Public key infrastructure / Public-key cryptography / Cryptographic protocols / Transport Layer Security / Public key certificate / X.509 / DocuSign / Online Certificate Status Protocol / SCVP / Authentication / Key

        DocuSign  Confidential    

    Add to Reading List

    Source URL: certificates.docusign.com

    Language: English - Date: 2014-02-21 18:55:48
    43Cryptography / Public key infrastructure / Public-key cryptography / Key management / Cryptographic protocols / Transport Layer Security / Public key certificate / X.509 / DocuSign / Online Certificate Status Protocol / SCVP / Authentication

        CP  (Certificate  Policy)  /  Certification   Practice  Statement  (CPS)      

    Add to Reading List

    Source URL: trust.docusign.com

    Language: English - Date: 2016-06-01 20:59:26
    44Cryptography / Computing / Cryptographic protocols / Juniper Networks / Pseudorandom number generators / Cryptographic nonce / Internet protocols / NetScreen Technologies / Challengeresponse authentication / ScreenOS / Internet Key Exchange / DiffieHellman key exchange

    A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney†, Christina Garman‡, Matthew Green‡, Nadia Heninger†, Jacob Maskiewicz§, Eric Rescorla§, Hovav Shacham§, Ralf-Philipp We

    Add to Reading List

    Source URL: dualec.org

    Language: English - Date: 2016-04-15 12:48:33
    45Cryptography / Secure communication / Cryptographic hash functions / Cryptographic protocols / Hashing / Transport Layer Security / Collision attack / Cipher suite / MD5 / OpenSSL / SHA-2 / Man-in-the-middle attack

    Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

    Add to Reading List

    Source URL: mitls.org

    Language: English - Date: 2016-01-06 07:34:05
    46Cryptography / Public key infrastructure / Public-key cryptography / Key management / Cryptographic protocols / Transport Layer Security / Public key certificate / X.509 / DocuSign / Online Certificate Status Protocol / SCVP / Authentication

        DocuSign  Confidential    

    Add to Reading List

    Source URL: certificates.docusign.com

    Language: English - Date: 2014-02-20 15:11:45
    47Computing / Computer architecture / Computer network security / Wireless networking / IEEE 802.11 / Local area networks / Cryptographic protocols / Wireless / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Ubuntu / Cracking of wireless networks

    Connecting to the Rovernet WPA2 Secured Wireless Network with with UbuntuIntreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

    Add to Reading List

    Source URL: www.it.mtu.edu

    Language: English - Date: 2015-09-21 08:47:24
    48Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: mitls.org

    Language: English
    49Computer access control / Hypertext Transfer Protocol / Cryptographic protocols / Password / Security / Authentication / Phishing / HTTP cookie / Cryptographic nonce / Challengeresponse authentication / SQRL / HTTPS

    I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-07-05 13:35:58
    50Computer access control / Internet protocols / Cloud standards / Digital media / Mobile content / Universal Plug and Play / OAuth / Authentication / Application programming interface / Mediascape

    Instrument: Collaborative Project (STREP) Call Identifier: FP7-ICT2013-10 Grant Agreement: WP3 – CONNECT – Multi-connection and authentication

    Add to Reading List

    Source URL: www.mediascapeproject.eu

    Language: English - Date: 2015-11-20 12:57:38
    UPDATE