Message authentication

Results: 402



#Item
21Text messaging / Computer access control / Social networking services / Short Message Service / Authentication / Password / Google Search / Facebook / Internet privacy

Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field Study Yusuf Albayram Mohammad Maifi Hasan Khan

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:57
22Cryptography / Key management / Wireless networking / Building automation / Home automation / Block cipher / Symmetric-key algorithm / Skipjack / Encryption / Blowfish / Message authentication code / Data Encryption Standard

On the Security of Intra-Car Wireless Sensor Networks

Add to Reading List

Source URL: www.csie.ntu.edu.tw

Language: English - Date: 2014-04-11 22:39:21
23Distributed computing architecture / Process calculi / Inter-process communication / Ambient calculus / Ambient intelligence / Message passing / Actor model / Short Message Service / Distributed object / Multi-factor authentication

Ambient References: Addressing Objects in Mobile Networks Tom Van Cutsem ∗ Elisa Gonzalez Jessie Dedecker ∗ Stijn Mostinckx †

Add to Reading List

Source URL: soft.vub.ac.be

Language: English - Date: 2007-01-09 07:10:57
24Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
25Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Advanced Encryption Standard / Block cipher mode of operation / SHA-1 / Hash-based message authentication code / Cryptographic Module Testing Laboratory / FIPS 140-3

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
26Stream ciphers / Data Encryption Standard / Message authentication codes / Cryptography / VEST / Authenticated encryption / Py / DEAL / Index of cryptography articles

Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
27Cryptography standards / Message authentication codes / Hashing / Cryptographic hash functions / FIPS 140-2 / Hash-based message authentication code / Linux kernel / Zeroisation / FIPS 140 / Loadable kernel module / Galois/Counter Mode / Block cipher mode of operation

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
28Computer access control / Computer security / Cryptography / Computing / YubiKey / Pluggable authentication module / One-time password / Hash-based message authentication code / Authentication / LinOTP / HMAC-based One-time Password Algorithm

YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X Login

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-04-12 12:42:03
29

Chapter 8 Implementation Pitfalls We have now learned about several very important cryptographic objects, including block ciphers, encryption schemes, message authentication schemes, and hash functions. Moreover, we disc

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-03-01 14:19:32
    30Cryptography / Crypto-anarchism / Internet privacy / Mix network / Secure communication / Ciphertext indistinguishability / Message authentication code

    Sphinx: A Compact and Provably Secure Mix Format George Danezis Ian Goldberg Microsoft Research,

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:48:59
    UPDATE