Password-based cryptography

Results: 89



#Item
51EMC Corporation / Advanced Encryption Standard / SecurID / Two-factor authentication / Software token / Password / Access token / Identity management / Authentication / Cryptography / Security / Computer security

Token Based Authentication as a Fully Hosted Service Key benefits Reliable •

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-11-07 11:09:46
52Security / Password / Cryptographic software / Hardware-based full disk encryption / Password manager / Cryptography / Disk encryption / Computer security

Technology Paper Can Your Computer Keep a Secret? Why All Laptop Data Protection Methods Are NOT Created Equal

Add to Reading List

Source URL: www.seagate.com

Language: English - Date: 2012-05-03 03:39:42
53Key management / Public key certificate / Professional certification / Password / Emergency medical services / Standards / Public-key cryptography / Electronic commerce

GET PLUGGED IN Web-Based Certification System Our transition from a paper-based EMCT certification and recertification process to an

Add to Reading List

Source URL: azdhs.gov

Language: English - Date: 2015-01-05 16:09:05
54Key management / Public key certificate / Professional certification / Password / Emergency medical services / Standards / Public-key cryptography / Electronic commerce

GET PLUGGED IN Web-Based Certification System Our transition from a paper-based EMCT certification and recertification process to an

Add to Reading List

Source URL: www.azdhs.gov

Language: English - Date: 2015-01-05 16:09:05
55Security / Hardware-based full disk encryption / Pre-boot authentication / Two-factor authentication / Trusted Platform Module / Password / One-time password / Authentication / USB flash drive / Disk encryption / Cryptography / Computer security

YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:07:18
56Password / Computer crimes / Passphrase / John the Ripper / Phishing / Password policy / Password fatigue / Security / Computer security / Cryptography

Text Entry Method Affects Password Security Yulong Yang† , Janne Lindqvist† , Antti Oulasvirta‡ † Rutgers University, ‡ Aalto University Abstract Background. Text-based passwords continue to be the

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2014-09-28 22:02:47
57Electronic commerce / Certificate authorities / Thawte / Cryptographic protocols / Extended Validation Certificate / X.509 / Public key certificate / Entrust / Password / Cryptography / Key management / Public-key cryptography

pixelock boosts confidence in password generation tool with thawte ev ssl certificates Pixelock is a web-based password generation tool that allows users to create and remember complex yet easy-to-use pass codes for onli

Add to Reading List

Source URL: www.thawte.com

Language: English - Date: 2013-02-11 18:36:47
58Cryptographic software / Mozilla add-ons / LastPass Password Manager / Cryptography / Password manager / Password fatigue / Password / Roboform / One-time password / Software / Security / Computer security

The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song University of California, Berkeley Abstract

Add to Reading List

Source URL: devd.me

Language: English - Date: 2014-11-09 00:08:12
59IEEE standards / Password / Zero-knowledge password proof / Challenge-response authentication / IEEE P1363 / Public-key cryptography / Password-authenticated key agreement / Password manager / Cryptography / Security / Cryptographic protocols

IEEE P1363.2: Password-based Cryptography David Jablon CTO, Phoenix Technologies NIST PKI TWG - July 30, 2003

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
60X.509 / ID-based encryption / Public key infrastructure / Authentication server / Revocation list / Certificate authority / Kerberos / Public key certificate / Authentication / Cryptography / Public-key cryptography / Key management

A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-13 09:22:49
UPDATE