Key authentication

Results: 993



#Item
131Cryptography / Public-key cryptography / Public key infrastructure / Key management / Public key certificate / Permanent account number / Identity document / Certificate authority / Authentication / Key / Smart card

NIC Certifying Authority National Informatics Centre Ministry of Communications & Information Technology Government of India Photo & ID proof to

Add to Reading List

Source URL: nicca.nic.in

Language: English - Date: 2014-06-30 05:31:35
132Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:38:44
133Message authentication codes / Public-key cryptography / Public key infrastructure / RSA / BurrowsAbadiNeedham logic / XTR

Pattern-Matching Spi-Calculusāˆ— Christian Haack Security of Systems Group Faculty of Science, Radboud University Postbus 9010, 6500 GL Nijmegen, The Netherlands

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:41:03
134Cryptography / Protocol composition logic / Authentication protocols / BurrowsAbadiNeedham logic / Communications protocol / Kerberos / Public-key cryptography / Cryptographic protocol

A. Datta et al. / Protocol Composition Logic 1 Protocol Composition Logic Anupam DATTA a , John C. MITCHELL b , Arnab ROY b and

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:08
135Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
136Authentication protocols / Symmetric-key cryptography / Computer network security / IP / Kerberos / NeedhamSchroeder protocol / Cryptography

Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:15
137Computing / Cryptography / Computer security / Computer network security / Cyberwarfare / Password / Denial-of-service attack / Firewall / SOAP / Authentication / Public-key cryptography / Internet security

Evidence-Based Access Control for Ubiquitous Web Services Nishith Khantal IIT, Kanpur

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
138Cryptography / Key management / Shared secret / Cryptographic protocol / Challengeresponse authentication / Key-agreement protocol

Secure Protocol Composition Anupam Datta John C. Mitchell Ante Derek Dusko Pavlovic

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:11
139Cryptography / Key management / Public-key cryptography / Public key infrastructure / Transport Layer Security / Certification Practice Statement / Certificate policy / Public key certificate / Revocation list / Professional certification / Root certificate / Authentication

CERTIFICATION PRACTICE STATEMENT (CPS) Published by eMudhra Limited 3rd Floor, Sai Arcade, Outer Ring Road, Devarabeesanahalli Bengaluru, Karnataka, India

Add to Reading List

Source URL: www.e-mudhra.com

Language: English - Date: 2015-06-30 02:40:54
UPDATE