Message authentication

Results: 402



#Item
81Electronic commerce / SMS / Text messaging / Mobile phone spam / Two-factor authentication / Mobile phone / Short message service center / Verizon Wireless / Mobile ticketing / Technology / Mobile technology / Mobile telecommunications

Mega AS Consulting Ltd. http://www.megaas.co.nz PO Box 55227, Mission Bay, Auckland, New Zealand Phone: +, Email:

Add to Reading List

Source URL: www.megaas.com

Language: English - Date: 2008-09-21 15:41:28
82Cryptographic protocols / Internet protocols / Open standards / Simple Authentication and Security Layer / Advanced Message Queuing Protocol / Apache Qpid / CRAM-MD5 / Password / Integrated Windows Authentication / Computing / Message-oriented middleware / Internet standards

PDF Document

Add to Reading List

Source URL: labs.mwrinfosecurity.com

Language: English - Date: 2015-05-22 06:07:51
83Directory services / Java platform / Java enterprise platform / Lightweight Directory Access Protocol / Apache ActiveMQ / Java Authentication and Authorization Service / Password / Streaming Text Oriented Messaging Protocol / Computing / Internet protocols / Message-oriented middleware

PDF Document

Add to Reading List

Source URL: labs.mwrinfosecurity.com

Language: English - Date: 2015-05-22 06:07:59
84Computational complexity theory / Zero-knowledge proof / Proof of knowledge / IP / Soundness / NP / Quadratic residue / Probabilistic method / Mathematical proof / Theoretical computer science / Cryptography / Cryptographic protocols

Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-04-05 00:17:40
85HMAC / Cryptographic hash function / Internet protocols / Cryptographic protocols / Key / FIPS 140-2 / Cryptography standards / SHA-2 / Cryptography / Message authentication codes / Hashing

FIPS PUB 198 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC)

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:56:45
86Power analysis / Side channel attack / Message authentication codes / Stream ciphers / Cryptographic hash functions / Differential cryptanalysis / Avalanche effect / VEST / Block cipher modes of operation / Cryptography / Espionage / Advanced Encryption Standard

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
87Spamming / Internet / Gmail / Message transfer agent / Anti-spam techniques / Email authentication / Email / Computer-mediated communication / Computing

Trend Micro Incorporated reserves the right to make changes to this document and to Hosted Email Security described herein without notice. Before installing and using Hosted Email Security, please review the readme fil

Add to Reading List

Source URL: docs.trendmicro.com

Language: English - Date: 2013-09-10 04:21:37
88Message authentication codes / Digital signature / Cryptographic hash function / Cryptographic primitive / RSA / Key / Probabilistic encryption / Block cipher / Galois/Counter Mode / Cryptography / Public-key cryptography / Key management

Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2004-08-02 17:51:17
89Computer-mediated communication / Spamming / Internet / DomainKeys Identified Mail / Salesforce.com / Email spam / Force.com / Email authentication / Anti-spam techniques / Email / Computing / Spam filtering

Trusted Message Delivery for Salesforce.com Overview With Trusted Message Delivery for Salesforce.com, we deploy one or more specially configured Sentrions either on your premises or in a hosted environment to route mail

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-04-21 19:52:08
90Key size / Message authentication code / Block cipher / Cryptographic hash function / Cryptography / Symmetric-key algorithm / Cipher

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:27
UPDATE