Authentication

Results: 7063



#Item
991Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security

Interfaces for Personal Identity Verification

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2016-02-16 14:47:45
992

EM For Windows™ Compliance Pack Do You Need Compliance Pack? Compliance Features User authentication Electronic signatures Full audit trail

Add to Reading List

Source URL: www.lkc.com

Language: English - Date: 2013-12-09 15:54:26
    993File sharing / Peer-to-peer / Email / Deliverable / Delft University of Technology / Internet / Authentication / Social peer-to-peer processes / Tribler / P2P

    QLectives – Socially Intelligent Systems for Quality Project noInstrument: Large-scale integrating project (IP) Programme: FP7-ICT Deliverable DQLectives Platform v2

    Add to Reading List

    Source URL: qlectives.eu

    Language: English - Date: 2011-03-17 06:51:42
    994

    Fast and Secure CBC-Type MAC Algorithms Mridul Nandi National Institute of Standards and Technology Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known meth

    Add to Reading List

    Source URL: www.isical.ac.in

    Language: English - Date: 2011-12-28 03:46:39
      995Computing / Software / Hypertext Transfer Protocol / Internet privacy / Cryptographic protocols / Secure communication / Cross-site request forgery / Computer access control / HTTP cookie / Same-origin policy / Basic access authentication / JavaScript

      Lightweight Server Support for Browser-Based CSRF Protection Alexei Czeskis University of Washington Alexander Moshchuk

      Add to Reading List

      Source URL: www2013.wwwconference.org

      Language: English - Date: 2014-07-21 08:47:06
      996Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

      The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2007-03-29 16:18:56
      997

      authuser(3zm) authuser(3zm) NAME authuser − remote authentication library using the Authentication Server

      Add to Reading List

      Source URL: www.zmailer.org

      Language: English - Date: 2006-12-13 14:07:47
        998

        End-to-end Design of a PUF based Privacy Preserving Authentication Protocol Aydin Aysu (Virginia Tech) Ege Gulcan (Virginia Tech) Daisuke Moriyama (NICT) Patrick Schaumont (Virginia Tech)

        Add to Reading List

        Source URL: www.cryptoexperts.com

        Language: English - Date: 2015-11-13 04:48:41
          999

          DATA SHEET CA Risk Authentication At a Glance CA Risk Authentication allows you to provide real-time protection against identity theft and online fraud via intelligent

          Add to Reading List

          Source URL: www.ca.com

          Language: English
            1000

            Secure Modular Password Authentication for the Web Using Channel Bindings Mark Manulis1 , Douglas Stebila2 , and Nick Denham2 1 Surrey Centre for Cyber Security, University of Surrey, UK

            Add to Reading List

            Source URL: manulis.eu

            Language: English - Date: 2015-03-31 12:21:55
              UPDATE