Password-based cryptography

Results: 89



#Item
31Public-key cryptography / Kerberos / Password / Diffie–Hellman key exchange / Shared secret / Key / Cryptography / Cryptographic protocols / Key management

Microsoft Word - Design of hybrid protocol-in password-based three-party key exchange settting.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-29 06:14:31
32Public-key cryptography / Password / Deniable encryption / Encrypting File System / Cryptography / Proxy re-encryption / Cloud computing

Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds Piotr K. Tysowski Dept. of Electrical & Computer Engineering University of Waterloo Waterloo, Ontario, Canada

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-09 11:25:14
33Random oracle / Password / ID-based encryption / Key-agreement protocol / Advantage / Public-key cryptography / Semantic security / Password Authenticated Key Exchange by Juggling / Cryptography / Cryptographic protocols / Password-authenticated key agreement

ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School of Engineering and Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 01:09:45
34Cyberwarfare / Password / Computer crimes / Passphrase / John the Ripper / Phishing / Crypt / Password policy / Cognitive password / Computer security / Security / Cryptography

Text Entry Method Affects Password Security Yulong Yang† , Janne Lindqvist† , Antti Oulasvirta‡ † Rutgers University, ‡ Aalto University Abstract Background. Text-based passwords continue to be the

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-21 23:17:08
35Security / Computer security / Cyberwarfare / Cryptography / Password / Encryption

Web-based Attacks on Host-Proof Encrypted Storage Delignat-Lavaud, Bhargavan

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2012-09-25 00:02:00
36Access control / Computer network security / Authentication / Notary / Packaging / Security token / Multi-factor authentication / Password / Risk-based authentication / Security / Cryptography / Computer security

Effective and Painless Mult-Factor Authentication

Add to Reading List

Source URL: www.biometrie-online.net

Language: English - Date: 2014-10-27 18:35:21
37Diffie–Hellman key exchange / Secure Remote Password protocol / Encrypted key exchange / Public-key cryptography / Internet Key Exchange / Salt / SPEKE / Password-authenticated key agreement / Cryptographic protocols / Cryptography / Password

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
38Cyberwarfare / Password / Fear appeals / Crypt / Password policy / Security / Cryptography / Computer security

How Interactivity Can Enhance the Effectiveness of Fear Appeals: A Web-based Field Experiment of Password Security Anthony Vance, David Eargle, Kirk Ouimet Brigham Young University Detmar Straub Georgia State University

Add to Reading List

Source URL: www.kirkouimet.com

Language: English - Date: 2013-04-02 01:59:02
39Computing / Cryptographic software / Pre-boot authentication / Two-factor authentication / Security token / Windows Vista / Password / Serial ATA / Hardware-based full disk encryption / Disk encryption / Cryptography / Computer security

End Point Security DigiSAFE DeskCrypt Features and Benefits Real-time hardware-based AES encryption and

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 01:58:50
40Computer security / Pre-boot authentication / Security token / Two-factor authentication / Password / Serial ATA / Authentication / Hardware-based full disk encryption / BitLocker Drive Encryption / Cryptography / Disk encryption / Security

End Point Security DigiSAFE DiskCrypt Features and Benefits Real-Time Hardware-Based Encryption

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 01:58:51
UPDATE