First Page | Document Content | |
---|---|---|
Date: 2011-02-26 09:55:10Internet protocols Wireless Information Security Challenge-response authentication Password authentication protocol Authentication protocol Automatic identification and data capture Computing Radio-frequency identification | The Swiss-Knife RFID Distance Bounding Protocol Chong Hee Kim , Gildas Avoine, Fran¸cois Koeune , Fran¸cois-XavierAdd to Reading ListSource URL: perso.uclouvain.beDownload Document from Source WebsiteFile Size: 222,11 KBShare Document on Facebook |
1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡DocID: 1xUUI - View Document | |
YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X LoginDocID: 1o9AS - View Document | |
Three-factor user authentication method using biometrics challenge response Haruhiko Fujii, Yukio Tsuruoka Nippon Telegraph and Telephone Corporation {fujii.haruhiko, tsuruoka.yukio}@lab.ntt.co.jp Abstract: We propose aDocID: 1lxXl - View Document | |
Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David WagnerDocID: 1fJRY - View Document | |
draft-melnikov-httpbis-scram-auth-01 - Salted Challenge Response …SCRAM— HTTP Authentication MechanismDocID: 1e7OC - View Document |