Password-based cryptography

Results: 89



#Item
21Internet / Internet privacy / Cryptographic software / Password / Encryption software / Email encryption / Jumbleme / Cryptography / Email / Computing

RPost SecuRmail Overview The RPost SecuRmail™ service automatically converts email messages to encrypted and password-protected PDF files. Offered on a low-cost,“postage”-based model, this software-as-a-service (Sa

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-04-21 19:52:05
22Computer security / Email authentication / Internet privacy / Email / Email encryption / Encryption software / Password / Encrypting File System / Email client / Computing / Cryptography / Cryptographic software

Voltage Encryption Overview Voltage Encryption provides an identity-based solution for inline encryption of email messages and attachments. A one-time identity registration allows users to read encrypted messages by simp

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-04-21 19:52:09
23Password / One-time password / Two-factor authentication / Time-based One-time Password Algorithm / Authentication / Security / Cryptography / Access control

For Immediate Release IIJ Launches One-time Password Application “IIJ SmartKey” --Develops free, standard-compliant application for iPhone and Android devices-TOKYO—April 3, 2015—Internet Initiative Japan Inc. (

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-04-06 01:57:18
24Password / ID-based encryption / Authentication / Transaction authentication number / Security / Cryptography / Access control

An Improved Remote User Authentication Scheme using Bilinear Pairings Sunder Lala & K.K.Goyalb a Department of Mathematics, Institute of Basic Science, Dr.B.R.Ambedkar University, Khandari, AgraU.P)

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-26 05:40:58
25Authentication / Biometrics / Man-in-the-middle attack / Security / Cryptography / Password

Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards Jian-Zhu Lu? , Shaoyuan Zhang, and Shijie Qie Department of Computer Science, Jinan University, Guangzhou, Guangdong, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-13 05:22:49
26Cryptography / Password / One-time password / Authentication / IPAQ / S/KEY / Bluetooth / Security / Mobile computers / Technology

Loud and Clear: Human-Verifiable Authentication Based on Audio Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, and Ersin Uzun Department of Computer Science University of California, Irvine {goodrich,ms

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-28 12:55:55
27Cryptographic protocols / Hashing / Password / Salt / Rainbow table / Hash table / Crypt / Random oracle / SHA-2 / Cryptography / Cryptographic hash functions / Search algorithms

Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda and David Pointcheval ENS, Paris, France ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-10-14 17:20:37
28Computational hardness assumptions / Diffie–Hellman key exchange / Diffie–Hellman problem / Weil pairing / ID-based encryption / Password authentication protocol / Public-key cryptography / Boneh/Franklin scheme / Cryptography / Cryptographic protocols / Finite fields

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
29Security / Computer security / Cryptography / Passphrase / Password / Backup / Remote backup service / Encrypting File System / FileVault / Disk encryption / Cryptographic software / Computing

High Security Online Backup A Cyphertite White Paper February, 2013 Cloud-Based

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-02-11 17:33:51
30Cryptographic protocols / Cryptography / Public-key cryptography / Password authentication protocol

Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang1 and Xiaofeng Chen2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-19 03:05:28
UPDATE