Message authentication

Results: 402



#Item
121Cybernetics / State space / Science / Systems theory / Systems science / Control theory / Message authentication codes / CMAC

Chapter 5 Theory of the FOX controller 5.1 Introduction This chapter describes a CMAC-based adaptive controller called FOX1 . FOX will learn to generate control signals that minimize an “error” function of the syste

Add to Reading List

Source URL: q12.org

Language: English - Date: 2002-03-13 22:50:54
122Simple Mail Transfer Protocol / SMTP Authentication / Port / Post Office Protocol / Message transfer agent / Microsoft Exchange Server / IP address / Transmission Control Protocol / POP before SMTP / Email / Computer-mediated communication / Computing

Mailgate Ltd. POPWeasel Microsoft is a registered trademark and Windows 95, Windows 98, Windows NT and Exchange Server are trademarks of Microsoft Corporation.

Add to Reading List

Source URL: www.mailgate.com

Language: English - Date: 2008-02-28 07:21:12
123Internet / Proxy server / Simple Mail Transfer Protocol / Message transfer agent / SMTP Authentication / Open mail relay / Post Office Protocol / Push email / SMTP proxy / Email / Computer-mediated communication / Computing

M ailgate Ltd. M ailGate User M anual Microsoft is a registered trademark and Windows 95, Windows 98

Add to Reading List

Source URL: www.mailgate.com

Language: English - Date: 2008-02-28 07:16:14
124RSA / Advanced Encryption Standard / Block cipher modes of operation / Message authentication codes / Cryptography / Stream cipher / Advantage

Boosting OMD for Almost Free Authentication of Associated Data Reza Reyhanitabar, Serge Vaudenay, and Damian Vizár EPFL, Switzerland Abstract. We propose pure OMD (p-OMD) as a new variant of the Offset Merkle-Damgård (

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 11:16:42
125Cyberwarfare / Computer security / Kerberos / Ticket Granting Ticket / Network file systems / Key distribution center / Server Message Block / Principal / Samba / Computing / Computer network security / Key management

1 Interoperability with Windows using CIFS File Sharing with Kerberos Authentication Jeff Layton

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-06-29 13:16:25
126Technology / Human–computer interaction / Identification / Wireless / HMAC / Stream cipher / Electronic Product Code / Cryptography / Symmetric-key algorithm / Message authentication codes / Radio-frequency identification / Automatic identification and data capture

Open problems pertaining to RFID anti-cloning and some observations Benjamin Arazi Dept. of Computer Engineering and Computer Science University of Louisville Louisville, KY 40292

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-03-26 14:09:34
127Committees / Consultative Committee for Space Data Systems / Cryptographic hash functions / Key size / Galois/Counter Mode / Advanced Encryption Standard / Block cipher / National Security Agency / SHA-1 / Cryptography / Message authentication codes / CCSDS

Report Concerning Space Data System Standards CCSDS CRYPTOGRAPHIC ALGORITHMS INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2014-12-18 16:46:56
128Security / CCSDS / Authentication / HMAC / Measurement / Science / Message authentication codes / Committees / Consultative Committee for Space Data Systems

Report Concerning Space Data System Standards AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2008-04-01 13:44:37
129Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / HTTP Secure / Transmission Control Protocol / FTPS / Secure communication / Cryptographic protocols / Computing

Fusion Embedded™ SSL Unicoi Systems’ Fusion Secure Socket Layer (SSL) and Transport Layer Security (TLS) provides powerful endpoint authentication, protecting against eavesdropping, message falsification and interfer

Add to Reading List

Source URL: www.unicoi.com

Language: English - Date: 2013-12-06 14:42:57
130Internet / Message transfer agent / MX record / Anti-spam techniques / Email authentication / Email / Computer-mediated communication / Computing

An Email Signature System for Eliminating Spam Robert Rose November 9, 2004 Abstract For my project, I propose to create an email client that incorporates public key / private key encryption to digitally sign email as it

Add to Reading List

Source URL: www.robertwrose.com

Language: English
UPDATE