Authentication protocols

Results: 771



#Item
731Cryptographic protocols / Authentication / X.509 / Revocation list / Public key certificate / Certificate authority / Cryptography / Public-key cryptography / Key management

Place and Time Authentication of Cultural Assets ∗ Leonardo Mostarda, Changyu Dong, and Naranker Dulay

Add to Reading List

Source URL: www.leonardomostarda.net

Language: English - Date: 2012-08-03 17:40:53
732Internet / Domain name system / Key management / Public-key cryptography / Domain Name System Security Extensions / IPsec / Authentication / Internet Security Association and Key Management Protocol / X.509 / Cryptography / Cryptographic protocols / Internet protocols

LNCS[removed]Enabling Practical IPsec Authentication for the Internet

Add to Reading List

Source URL: netcom.it.uc3m.es

Language: English - Date: 2009-07-22 08:04:32
733Computing / Information / Cost estimation in software engineering / EMI / Communications protocol / Usability / UUCP / Application programming interface / Two-factor authentication / Network protocols / Technical communication / Technology

Project Estimation With Use Case Points Roy K. Clemmons

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-11-04 17:04:30
734Information / Challenge-response authentication / IP / Commitment scheme / NP / Transmission Control Protocol / Communications protocol / Error detection and correction / Alice and Bob / Cryptographic protocols / Data / Cryptography

Distance Bounding in Noisy Environments Dave Singel´ee and Bart Preneel ESAT-COSIC, K.U.Leuven,

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
735Public-key cryptography / Access control / ISO standards / Ubiquitous computing / Smart card / Authentication protocol / Public key infrastructure / Subscriber identity module / Password authentication protocol / Cryptography / Security / Cryptographic protocols

LNCS[removed]Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card

Add to Reading List

Source URL: researcher.watson.ibm.com

Language: English - Date: 2010-04-12 17:49:56
736Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Multi-party Off-the-Record Messaging Ian Goldberg

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2009-08-26 20:14:40
737Off-the-Record Messaging / Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Secure communication / Man-in-the-middle attack / Secure Shell / MQV / Internet Key Exchange / Cryptographic protocols / Cryptography / Deniable authentication

Secure Off-the-Record Messaging Mario Di Raimondo

Add to Reading List

Source URL: www.dmi.unict.it

Language: English - Date: 2005-09-03 05:31:59
738Internet protocols / Wireless / Information / Security / Challenge-response authentication / Password authentication protocol / Authentication protocol / Automatic identification and data capture / Computing / Radio-frequency identification

The Swiss-Knife RFID Distance Bounding Protocol Chong Hee Kim , Gildas Avoine, Fran¸cois Koeune , Fran¸cois-Xavier

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2011-02-26 09:55:10
739Internet protocols / Computer network security / HOTP / One-time password / Two-factor authentication / Password authentication protocol / Password / Authentication server / Authentication / Computer security / Security / Cryptography

HOTP-Based User Authentication Scheme in Home Networks Binod Vaidya1 , Jong Hyuk Park2 , and Joel J.P.C. Rodrigues3

Add to Reading List

Source URL: netgna.it.ubi.pt

Language: English - Date: 2011-03-16 07:13:06
740Portable software / Cryptographic protocols / Online chat / Internet privacy / Cryptographic software / Off-the-Record Messaging / Authentication / Public key fingerprint / Pidgin / Software / Cryptography / Computing

A User Study of Off-the-Record Messaging Ryan Stedman

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2008-05-23 10:26:27
UPDATE