Authentication protocols

Results: 771



#Item
51Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2016-01-06 07:34:05
52

Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks∗ Hassan Jameel Asghar Centre for Advanced Computing Algorithms and Cryptography Department

Add to Reading List

Source URL: users.monash.edu.au

Language: English
    53Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Transport Layer Security / Hypertext Transfer Protocol / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2014-02-27 10:40:02
    54Computing / World Wide Web / Network protocols / Internet protocols / Biometrics / Nok Nok Labs / Computer access control / Clientserver model / FIDO Alliance / Web API / Authentication / Session

    FIDO UAF Application API and Transport Binding Specification v1.0 FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps/fido-uaf-client-api-transport-

    Add to Reading List

    Source URL: fidoalliance.org

    Language: English - Date: 2015-03-30 14:07:01
    55Cryptography / Computing / Security / Computer access control / Internet protocols / Internet Standards / Authentication protocols / Biometrics / Nok Nok Labs / Authentication / FIDO Alliance / Universal 2nd Factor

    FIDO Security Reference FIDO Alliance Proposed Standard 14 May 2015 This version: https://fidoalliance.org/specs/fido-u2f-v1.0-psfido-security-ref-v1.0pshtml Previous version: http://fidoalliance.org/

    Add to Reading List

    Source URL: fidoalliance.org

    Language: English - Date: 2015-06-29 13:40:25
    56

    Protocols and Light-Weight Algorithms for Wireless Authentication through Side Channels in IEEECommunication

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2010-04-20 22:15:19
      57Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Communications protocol / Logic / Security protocol notation

      JuneEncryption as an Abstract Datatype: an extended abstract

      Add to Reading List

      Source URL: www.qatar.cmu.edu

      Language: English - Date: 2004-12-05 23:21:27
      58Computing / Cryptography / Computer network security / Computer security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol

      The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

      Add to Reading List

      Source URL: www.strongswan.org

      Language: English - Date: 2010-06-11 08:24:10
      59Computer network security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol / AuthIP

      Microsoft PowerPoint - LinuxTag2009_Flyer_VPN_Solution.ppt [Compatibility Mode]

      Add to Reading List

      Source URL: www.strongswan.org

      Language: English - Date: 2009-06-21 15:09:29
      60Computing / Internet / Cryptography / Internet protocols / Internet Standards / Email / Transport Layer Security / Domain name system / Opportunistic TLS / Postfix / DNS-based Authentication of Named Entities / Simple Mail Transfer Protocol

      Continuous Measurement Platforms can help Mitigate Pervasive Surveillance Julian Kornberger Carsten Bormann RAIM Workshop, Saturday, 2015–10–31, Yokohama, JP Introduction

      Add to Reading List

      Source URL: irtf.org

      Language: English - Date: 2016-01-05 05:04:04
      UPDATE