Password-based cryptography

Results: 89



#Item
81MQV / Key-agreement protocol / Public-key cryptography / Password-authenticated key agreement / Alice and Bob / XTR / Key authentication / Station-to-Station protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / YAK

On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-12-25 18:38:22
82Computer security / Privacy / OpenID / Credential / Internet privacy / Security Assertion Markup Language / X.509 / Password / Public-key cryptography / Identity management / Identity / Cryptography

Attribute-Based Credentials for Trust H2.1 - ABC4Trust Architecture for Developers Jan Camenisch, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Kai Rannenberg

Add to Reading List

Source URL: abc4trust.eu

Language: English - Date: 2012-11-28 16:26:39
83McAfee / Cryptography / Security token / One-time password / Two-factor authentication / Password / Software token / Authentication / Password manager / Security / Computer security / Access control

Case Study Cloudalize Customer profile Cloud services provider based in Belgium

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:41
84Biometrics / Two-factor authentication / Authentication / Security token / Keystroke dynamics / Risk-based authentication / Password authentication protocol / Password / Information security / Security / Cryptography / Access control

Alternative authentication – what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount

Add to Reading List

Source URL: www.chyp.com

Language: English - Date: 2013-12-13 13:58:42
85Password / Salt / Shadow password / Crypt / Cryptographic software / Password cracking / Passwd / Password strength / System software / Cryptography / Computer security

A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack Udi Manber1

Add to Reading List

Source URL: webglimpse.net

Language: English - Date: 2002-10-24 20:55:09
86Science / Password / Commonwealth Scientific and Industrial Research Organisation / Cryptography

Using Gaze Based Passwords as an Authentication Mechanism for Password Input

Add to Reading List

Source URL: 2013.petmei.org

Language: English - Date: 2013-09-02 02:53:13
87Internet protocols / Computer network security / HOTP / One-time password / Two-factor authentication / Password authentication protocol / Password / Authentication server / Authentication / Computer security / Security / Cryptography

HOTP-Based User Authentication Scheme in Home Networks Binod Vaidya1 , Jong Hyuk Park2 , and Joel J.P.C. Rodrigues3

Add to Reading List

Source URL: netgna.it.ubi.pt

Language: English - Date: 2011-03-16 07:13:06
88Microsoft Windows / Hardware-based full disk encryption / Encryption / USB flash drive / Trusted Computing Group / Backup / Cold boot attack / Trusted Computing / Password / Disk encryption / Cryptography / Computer security

Ten Reasons to Buy Self-Encrypting Drives September 2010

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-09-13 10:53:18
89Crypt / Password / PBKDF2 / Salt / Key / Passphrase / Key stretching / Password-based cryptography / Cryptography / Key management / Key derivation function

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:41:01
UPDATE