Authentication protocols

Results: 771



#Item
761Information / IP / Zero-knowledge proof / Radio-frequency identification / NP / Communications protocol / Authentication protocol / Man-in-the-middle attack / Security parameter / Cryptography / Cryptographic protocols / Data

PDF Document

Add to Reading List

Source URL: sites.uclouvain.be

Language: English - Date: 2010-06-22 11:06:21
762Access control / Key management / Cryptographic protocols / Internet protocols / X.509 / Authentication / Authorization / Atomic authorization / Public key certificate / Cryptography / Security / Public-key cryptography

PDF Document

Add to Reading List

Source URL: mason.gmu.edu

Language: English - Date: 2009-03-15 13:49:00
763System administration / Security / HP Integrated Lights-Out / Internet protocols / Internet standards / Two-factor authentication / International Labour Organization / HTTP cookie / Transport Layer Security / Computing / Information technology management / Out-of-band management

PDF Document

Add to Reading List

Source URL: h20000.www2.hp.com

Language: English - Date: 2011-09-20 14:16:06
764Crime prevention / National security / Cryptographic protocols / Computer network security / Information security / Acronym and initialism / Common Criteria / Authentication / CCMP / Cryptography / Security / Secure communication

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-03-01 13:02:16
765Technology / Wireless / Computer network security / IEEE 802.11 / Secure communication / IEEE 802.11i-2004 / Wireless security / Extensible Authentication Protocol / IEEE 802.1X / Wireless networking / Cryptography / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-21 15:38:10
766Message authentication codes / Cryptographic hash functions / HMAC / MD5 / MD4 / Cryptographic protocols / SHA-1 / HAVAL / Transport Layer Security / Cryptography / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-12 14:50:30
767CCM mode / Cryptographic protocols / Secure communication / Block cipher / CBC-MAC / Authenticated encryption / Stream cipher / Cryptographic hash function / Advantage / Cryptography / Block cipher modes of operation / Message authentication codes

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:55:38
768Wireless networking / Data / Information / Secure communication / Internet standards / Extensible Authentication Protocol / Transport Layer Security / Wi-Fi Protected Access / Captive portal / Computing / Cryptographic protocols / Computer network security

PDF Document

Add to Reading List

Source URL: riosec.com

Language: English - Date: 2010-05-19 20:38:21
769Challenge-response authentication / Commitment scheme / IP / Zero-knowledge proof / Distance-bounding protocol / NP / Cryptographic nonce / Alice and Bob / Public-key cryptography / Cryptography / Cryptographic protocols / Complexity classes

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-07-23 09:02:44
UPDATE