Authentication protocols

Results: 771



#Item
641Universal Mobile Telecommunications System / Mobile technology / Wireless networking / Videotelephony / 3GPP / Extensible Authentication Protocol / User equipment / Roaming / Subscriber identity module / Technology / Software-defined radio / Wireless

TS[removed]V11[removed]Universal Mobile Telecommunications System (UMTS); LTE; 3GPP system to Wireless Local Area Network (WLAN) interworking; WLAN User Equipment (WLAN UE) to network protocols; Stage 3 (3GPP TS[removed]

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-07-10 10:32:52
642Cryptographic protocols / Propositional calculus / Boolean algebra / Classical logic / Kerberos / Modal logic / Public-key cryptography / Yahalom / Burrows–Abadi–Needham logic / Logic / Cryptography / Mathematical logic

A Semantics for a Logic of Authentication (Extended Abstract) Martn Abadi Digital Equipment Corporation

Add to Reading List

Source URL: www.markrtuttle.com

Language: English - Date: 2007-04-26 00:00:00
643Technology / Information / EAP-SIM / Extensible Authentication Protocol / Universal Mobile Telecommunications System / Subscriber identity module / Network switching subsystem / GSM / Wireless security / Cryptographic protocols / Computer network security / Computing

An Ontology for Generic Wireless Authentication 1 Declaration

Add to Reading List

Source URL: www.linecity.de

Language: English - Date: 2005-12-04 07:55:51
644Security / Computing / Internet / United States Citizenship and Immigration Services / Transport Layer Security / HTTP Secure / Password / Two-factor authentication / Optional Practical Training / Cryptographic protocols / Secure communication / Immigration to the United States

Microsoft Word - November update to October 2011 report on USCIS transformation.docx

Add to Reading List

Source URL: www.americanbar.org

Language: English - Date: 2014-02-27 18:29:33
645SPEKE / Password Authenticated Key Exchange by Juggling / Encrypted key exchange / Diffie–Hellman key exchange / Password / Public-key cryptography / IEEE P1363 / Key exchange / Authentication / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password Authenticated Key Exchange by Juggling - A key exchange protocol without PKI

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-16 17:16:56
646Password-authenticated key agreement / Electronic commerce / Password / Two-factor authentication / Man-in-the-middle attack / Biometrics / Security token / RSA / Authentication / Cryptography / Security / Cryptographic protocols

Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke School of Computing Science Newcastle University {feng.hao, dylan.clarke}@ncl.ac.uk

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2012-01-30 18:16:54
647MQV / Key-agreement protocol / Public-key cryptography / Password-authenticated key agreement / Alice and Bob / XTR / Key authentication / Station-to-Station protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / YAK

On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-12-25 18:38:22
648Random oracle / Public-key cryptography / Authentication protocol / Smart card / Key-agreement protocol / Perfect forward secrecy / Cryptography / Cryptographic protocols / Advantage

A Cryptographic Analysis of OPACITY ¨ ur Dagdelen Ozg¨ Marc Fischlin Tommaso Gagliardoni Giorgia Azzurra Marson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-22 11:29:49
649Computer security / Data / Internet standards / Internet protocols / Cryptographic protocols / Kerberos / OpenLDAP / Lightweight Directory Access Protocol / Apache Directory / Computing / Computer network security / Directory services

 ­ KrbLDAP ­ A new secure authentication concept Wydział Informatyki Katedra Sieci Komputerowych Specjalizacja: Sieci Komputerowe

Add to Reading List

Source URL: olo.org.pl

Language: English - Date: 2012-02-06 11:15:47
650Internet protocols / Password manager / Password / Two-factor authentication / Security token / One-time password / OAuth / Authentication / Phishing / Security / Computer security / Access control

View from the C-Suite Authentication at Scale Eric Grosse and Mayank Upadhyay | Google Google is investing in authentication using two-step verification via one-time passwords and public-keybased technology to achieve s

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2013-01-24 15:31:05
UPDATE