Authentication protocols

Results: 771



#Item
61

SAS-Based Group Authentication and Key Agreement Protocols Sven Laur1? and Sylvain Pasini2?? 1 Helsinki University of Technology, Finland

Add to Reading List

Source URL: lepo.it.da.ut.ee

Language: English - Date: 2007-12-10 05:34:48
    62Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / Cipher suite

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2014-02-27 10:40:02
    63Secure communication / Cryptographic protocols / Internet Standards / Computer network security / Transport Layer Security / HTTPS / OpenSSL / Cipher suite / Handshaking / End-to-end encryption / Middlebox / Extensible Authentication Protocol

    Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2015-07-29 16:55:02
    64Cryptography / Public-key cryptography / Key management / Internet protocols / Internet Standards / Cryptographic protocols / Named data networking / Authentication / Domain Name System Security Extensions / Key / Unique key / Transport Layer Security

    Schematizing Trust in Named Data Networking Yingdi Yu Alexander Afanasyev UCLA

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:57
    65Wireless networking / Cryptographic protocols / Computer access control / Computer network security / Authentication protocol / Mutual authentication / Digest access authentication / Extensible Authentication Protocol / Authentication / Man-in-the-middle attack

    Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

    Add to Reading List

    Source URL: asokan.org

    Language: English - Date: 2015-04-08 16:31:41
    66Network architecture / Emerging technologies / Configuration management / Software-defined networking / Network protocols / OpenFlow / American brands / Access control / Computer network / Cisco Systems / Network switch / Hewlett Packard Enterprise Networking

    Authentication for Resilience: the Case of SDN Dongting Yu1 , Andrew W. Moore1 , Chris Hall2 , and Ross Anderson1 1 Computer Laboratory, University of Cambridge 2

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2013-12-20 08:55:40
    67Computing / Software / Hypertext Transfer Protocol / Internet privacy / Cryptographic protocols / Secure communication / Cross-site request forgery / Computer access control / HTTP cookie / Same-origin policy / Basic access authentication / JavaScript

    Lightweight Server Support for Browser-Based CSRF Protection Alexei Czeskis University of Washington Alexander Moshchuk

    Add to Reading List

    Source URL: www2013.wwwconference.org

    Language: English - Date: 2014-07-21 08:47:06
    68Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

    Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:38:44
    69Computing / Computer access control / Computer security / Federated identity / Cloud standards / Identity management / Internet protocols / OAuth / OpenID / Mashup / Authentication / WS-Security

    Microsoft Word - Secure Delegation for Web 2.0 Published.doc

    Add to Reading List

    Source URL: w2spconf.com

    Language: English - Date: 2012-02-07 16:10:03
    70

    Man-in-the-Middle in Tunnelled Authentication Protocols Extended Abstract? N. Asokan, Valtteri Niemi, and Kaisa Nyberg Nokia Research Center, Finland {n.asokan,valtteri.niemi,kaisa.nyberg}@nokia.com

    Add to Reading List

    Source URL: asokan.org

    Language: English - Date: 2009-03-03 14:04:29
      UPDATE