1![A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012 Stig F. Mjølsnes A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012 Stig F. Mjølsnes](https://www.pdfsearch.io/img/a4d9e18bf50096fca9ac3d84bdd0f8ff.jpg) | Add to Reading ListSource URL: csf2012.seas.harvard.eduLanguage: English - Date: 2012-07-05 18:15:12
|
---|
2![IBM Ported Tools for z/OS: OpenSSH Key Authentication June 12,2012 Kirk Wolf Steve Goetze http://dovetail.com IBM Ported Tools for z/OS: OpenSSH Key Authentication June 12,2012 Kirk Wolf Steve Goetze http://dovetail.com](https://www.pdfsearch.io/img/94ec404a26e27294255171ab95bbdeff.jpg) | Add to Reading ListSource URL: dovetail.com- Date: 2012-06-14 11:36:21
|
---|
3![A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1 2 A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1 2](https://www.pdfsearch.io/img/6e852c8d129e1580f87d5761bfdb5a06.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2014-09-17 07:10:18
|
---|
4![Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions](https://www.pdfsearch.io/img/52c161913f3df67befb4caca8149a593.jpg) | Add to Reading ListSource URL: liu.diva-portal.org- Date: 2013-04-18 05:30:18
|
---|
5![Direct proof of security of Wegman-Carter authentication with partially known key Aysajan Abidin and Jan-Åke Larsson Linköping University Post Print Direct proof of security of Wegman-Carter authentication with partially known key Aysajan Abidin and Jan-Åke Larsson Linköping University Post Print](https://www.pdfsearch.io/img/5738d9c90bde1b563c2d0d131652eca2.jpg) | Add to Reading ListSource URL: liu.diva-portal.org- Date: 2014-11-19 10:41:40
|
---|
6![Strengthening Public Key Authentication against Key Theft Short Paper Martin Kleppmann1 and Conrad Irwin2 1 Strengthening Public Key Authentication against Key Theft Short Paper Martin Kleppmann1 and Conrad Irwin2 1](https://www.pdfsearch.io/img/d5261a7e4c74391763693f59bf42d599.jpg) | Add to Reading ListSource URL: martin.kleppmann.com- Date: 2016-08-24 14:47:03
|
---|
7![Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick](https://www.pdfsearch.io/img/10ea9f77b3d2ccaef18f5676c237edbe.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2006-06-02 21:42:44
|
---|
8![Network Working Group Request for Comments: 2726 Category: Standards Track J. Zsako BankNet Network Working Group Request for Comments: 2726 Category: Standards Track J. Zsako BankNet](https://www.pdfsearch.io/img/a69a0312b174432a42cb769210a0435d.jpg) | Add to Reading ListSource URL: www.rfc-editor.orgLanguage: English - Date: 2002-03-27 15:35:49
|
---|
9![l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number: l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:](https://www.pdfsearch.io/img/c25ae109e4132102a309920a4ee6a712.jpg) | Add to Reading ListSource URL: www.chaum.comLanguage: English - Date: 2015-05-26 20:08:31
|
---|
10![WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult](https://www.pdfsearch.io/img/1d1c5a45d0ceda4f4061b3c063550b00.jpg) | Add to Reading ListSource URL: vast.uccs.eduLanguage: English - Date: 2013-12-13 13:04:18
|
---|