Key authentication

Results: 993



#Item
1A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012  Stig F. Mjølsnes

A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012 Stig F. Mjølsnes

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:12
    2IBM Ported Tools for z/OS: OpenSSH Key Authentication June 12,2012 Kirk Wolf Steve Goetze http://dovetail.com

    IBM Ported Tools for z/OS: OpenSSH Key Authentication June 12,2012 Kirk Wolf Steve Goetze http://dovetail.com

    Add to Reading List

    Source URL: dovetail.com

    - Date: 2012-06-14 11:36:21
      3A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1  2

      A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1 2

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2014-09-17 07:10:18
        4Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

        Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

        Add to Reading List

        Source URL: liu.diva-portal.org

        - Date: 2013-04-18 05:30:18
          5Direct proof of security of Wegman-Carter authentication with partially known key Aysajan Abidin and Jan-Åke Larsson  Linköping University Post Print

          Direct proof of security of Wegman-Carter authentication with partially known key Aysajan Abidin and Jan-Åke Larsson Linköping University Post Print

          Add to Reading List

          Source URL: liu.diva-portal.org

          - Date: 2014-11-19 10:41:40
            6Strengthening Public Key Authentication against Key Theft Short Paper Martin Kleppmann1 and Conrad Irwin2 1

            Strengthening Public Key Authentication against Key Theft Short Paper Martin Kleppmann1 and Conrad Irwin2 1

            Add to Reading List

            Source URL: martin.kleppmann.com

            - Date: 2016-08-24 14:47:03
              7Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

              Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

              Add to Reading List

              Source URL: cups.cs.cmu.edu

              Language: English - Date: 2006-06-02 21:42:44
              8Network Working Group Request for Comments: 2726 Category: Standards Track J. Zsako BankNet

              Network Working Group Request for Comments: 2726 Category: Standards Track J. Zsako BankNet

              Add to Reading List

              Source URL: www.rfc-editor.org

              Language: English - Date: 2002-03-27 15:35:49
              9l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

              l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

              Add to Reading List

              Source URL: www.chaum.com

              Language: English - Date: 2015-05-26 20:08:31
              10WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and  Terrance E. Boult

              WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult

              Add to Reading List

              Source URL: vast.uccs.edu

              Language: English - Date: 2013-12-13 13:04:18