Challenge-response authentication

Results: 139



#Item
1Internet / Computing / Cyberwarfare / Internet security / Computer network security / Internet Standards / Internet protocols / Transmission Control Protocol / Denial-of-service attack / TCP reset attack / IP address spoofing / Internet protocol suite

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-02-22 02:35:33
2Computer access control / Computer security / Cryptography / Computing / YubiKey / Pluggable authentication module / One-time password / Hash-based message authentication code / Authentication / LinOTP / HMAC-based One-time Password Algorithm

YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X Login

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-04-12 12:42:03
3

Three-factor user authentication method using biometrics challenge response Haruhiko Fujii, Yukio Tsuruoka Nippon Telegraph and Telephone Corporation {fujii.haruhiko, tsuruoka.yukio}@lab.ntt.co.jp Abstract: We propose a

Add to Reading List

Source URL: fc13.ifca.ai

Language: English - Date: 2013-03-27 20:42:00
    4Cryptography / Distance-bounding protocol / IP / NP / Alice and Bob / Formal verification / Challenge-response authentication / The Verifier / Transmission Control Protocol / Theoretical computer science / Cryptographic protocols / Applied mathematics

    Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

    Add to Reading List

    Source URL: naveen.ksastry.com

    Language: English - Date: 2013-06-08 15:25:49
    5

    draft-melnikov-httpbis-scram-auth-01 - Salted Challenge Response …SCRAM— HTTP Authentication Mechanism

    Add to Reading List

    Source URL: tools.ietf.org

    Language: English - Date: 2015-06-03 22:29:31
      6Data / Information / Communications protocol / Challenge-response authentication / Cryptography / Physical Unclonable Function / Randomness

      2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2013-04-05 19:56:34
      7Physical Unclonable Function / Randomness / Analysis of algorithms / Challenge-response authentication / IP / Control flow graph / PUF / Pseudorandomness / Copy protection / Cryptography / Applied mathematics / Theoretical computer science

      A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2012-06-05 18:18:00
      8Computer crimes / Cryptography / Identity management / Password / Phishing / One-time password / Single sign-on / Challenge-response authentication / Keystroke logging / Security / Computer security / Access control

      Proc. WWW 2007, Banff, BC A Large-Scale Study of Web Password Habits Dinei Florencio

      Add to Reading List

      Source URL: cyberside.planet.ee

      Language: English - Date: 2013-11-03 21:52:06
      9Cryptographic protocols / HTTP / Password / Challenge-response authentication / Two-factor authentication / Security token / Digest access authentication / Cryptographic nonce / Authentication / Security / Cryptography / Computer security

      CHAPTER 3 Protocols It is impossible to foresee the consequences of being clever.

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2011-12-05 05:22:54
      10Password / Salt / Challenge-response authentication / Security token / Random password generator / Passwd / Passphrase / One-time password / Crypt / Security / Computer security / Cryptography

      This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2011-07-10 02:35:13
      UPDATE