Authentication protocols

Results: 771



#Item
691Federated identity / OpenID / Cryptographic protocols / One-time password / Password manager / Password / Phishing / Single sign-on / Authentication / Security / Computer security / Access control

Secure, Consumer-Friendly Web Authentication and Payments with a Phone Ben Dodson, Debangsu Sengupta, Dan Boneh, and Monica S. Lam? Computer Science Department Stanford University Stanford, CA 94305

Add to Reading List

Source URL: mobisocial.stanford.edu

Language: English - Date: 2011-03-29 19:35:16
692Yahoo! / Computing / DomainKeys Identified Mail / Data / Information / DomainKeys / Domain Name System / Author Domain Signing Practices / Email authentication / Spam filtering / Cryptographic protocols

DomainKeys Identified Mail (DKIM) Allows an organization to claim responsibility for transmitting a message, in a way that can be validated by a recipient

Add to Reading List

Source URL: www.dkim.org

Language: English - Date: 2009-07-12 13:08:00
693Steganographic file system / Serpent / Computer security / Tamper resistance / Ambient intelligence / Ross J. Anderson / Cryptography / Security / Lecture Notes in Computer Science

Bibliography [1] M Abadi, ‘‘Explicit Communications Revisited: Two New Attacks on Authentication Protocols’’, in IEEE Transactions on Software Engineering v 23 no 3 (Mar 97) pp 185–[removed]M Abadi, RM Needham,

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 10:00:47
694Authentication protocol / Diffie–Hellman key exchange / Public-key cryptography / Password authentication protocol / Random oracle / Key-agreement protocol / Cryptography / Cryptographic protocols / Internet protocols

Authentication for Paranoids: Multi-Party Secret Handshakes Stanislaw Jarecki, Jihye Kim, and Gene Tsudik Computer Science Department University of California, Irvine {stasio, jihyek, gts}@ics.uci.edu

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2006-07-12 12:31:28
695DEAL / Phelix / Twofish / Lecture Notes in Computer Science / Advanced Encryption Standard / Fast Software Encryption / Cryptographic hash function / Cryptography / Stream ciphers / Stefan Lucks

Publications by Stefan Lucks Books and Chapters in Books 1. A. Weimerskirch, D. Westhoff, S. Lucks, E. Zenner, “Efficient Pairwise Authentication Protocols for Sensor Networks: Theory and Performance Analysis”, IEEE

Add to Reading List

Source URL: th.informatik.uni-mannheim.de

Language: English - Date: 2006-06-20 09:24:04
696Access control / Cryptographic protocols / Simple public key infrastructure / X.509 / Public key certificate / Authentication / PERMIS / Internet privacy / Authorization certificate / Cryptography / Public-key cryptography / Key management

Implementing Access Control to People Location Information Urs Hengartner† and Peter Steenkiste†‡ † Department of Computer Science ‡

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-07-01 17:17:59
697OSI protocols / Hypertext Transfer Protocol / HTTP cookie / Basic access authentication / MIME / Communications protocol / HTTP / Computing / Data

HttpClient Tutorial Oleg Kalnichevski Jonathan Moore Jilles van Gurp

Add to Reading List

Source URL: hc.apache.org

Language: English - Date: 2014-06-06 04:23:51
698Internet protocols / Federated identity / Computer crimes / Security token / Two-factor authentication / Single sign-on / Password / Keystroke logging / Authentication / Security / Computer security / Access control

ProtectID_White_Paper_4 _2_

Add to Reading List

Source URL: www.strikeforcetech.com

Language: English - Date: 2011-02-10 11:55:06
699Federated identity / Internet protocols / Internet standards / Two-factor authentication / Single sign-on / RADIUS / Authentication / OpenID / Multi-factor authentication / Security / Computer security / Access control

ProtectID_Cloud Service v2

Add to Reading List

Source URL: www.strikeforcetech.com

Language: English - Date: 2011-02-10 11:55:06
700Computing / Needham–Schroeder protocol / Near field communication / Communications protocol / Password authentication protocol / Cryptographic protocols / Data / Information

Formally defining NFC M-coupon requirements, with a case study Ali Alshehri, Steve Schneider Dept. of Computing, University of Surrey Guildford GU2 7XH, England Email: [removed] and [removed].

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-12-06 10:43:01
UPDATE