Strong cryptography

Results: 135



#Item
1Computer access control / Cryptography / Computer security / Prevention / Multi-factor authentication / Authentication / Financial technology / Password

CASE STUDY Cyber-security offering strong, cost effective two factor authentication. Small businesses

Add to Reading List

Source URL: www.digitalcatapultcentre.org.uk

Language: English - Date: 2016-03-09 06:12:58
2Cryptography / Integer sequences / Integer factorization algorithms / Primality tests / Safe prime / Finite fields / RSA / Prime number / Strong prime / Blum integer / Trial division / Quadratic sieve

The Million-Key Question—Investigating the Origins of RSA Public Keys Petr Švenda, Matúš Nemec, Peter Sekan, Rudolf Kvašňovský, David Formánek, David Komárek, and Vashek Matyáš, Masaryk University https://www

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-08-10 03:08:02
3Computer access control / Cryptography / Computer security / Credit cards / Strong authentication / 3-D Secure / Security / Authentication / Card scheme

  14 th November 2014 European Banking Authority Tower 42 (levelOld Broad Street London EC2N 1HQ

Add to Reading List

Source URL: www.isignthis.com

Language: English - Date: 2016-01-24 23:48:38
4Software / Cryptography / Computing / Character encoding / Unicode Transformation Formats / Encodings / Cryptographic software / Password / Passphrase / Random password generator / UTF-16 / Byte order mark

PWGen for Windows - Generator of cryptographically strong passwords USER MANUAL VersionLicensing Information

Add to Reading List

Source URL: pwgen-win.sourceforge.net

Language: English - Date: 2016-04-19 17:08:02
5Computer access control / Computing / Cryptography / Computer security / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / Time-based One-time Password Algorithm / One-time password / Dropbox / CCID / LastPass

YubiKey 4 and YubiKey 4 Nano • YubiKey 4 and YubiKey 4 Nano offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV, OpenPGP, OATH-TOTP, and OATH-HOTP) --

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:44
6Cryptography / Cryptographic software / Key management / Strong cryptography / Pretty Good Privacy / Cypherpunk / Encryption / Key / Public-key cryptography / Export of cryptography from the United States / Phil Zimmermann / Data Encryption Standard

Strong Cryptography The Global Tide of Change by Arnold G. Reinhold No. 51

Add to Reading List

Source URL: object.cato.org

Language: English - Date: 2012-12-14 18:44:35
7Computer access control / Cryptography / Computer security / Computing / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / LastPass / Time-based One-time Password Algorithm / One-time password / Password manager / CCID

YubiKey Standard and YubiKey Nano • YubiKey Standard and YubiKey Nano offer strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button • Works instantly with no need to re-type p

Add to Reading List

Source URL: www.yubico.com

Language: English
8Security / Prevention / Cyberwarfare / Computer security / National security / Computer network security / Crime prevention / Cryptography / Threat / Cyber threat intelligence / Cyber-attack / Information security

The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-02-25 11:51:52
9Computer access control / Cryptography / Computing / Computer security / YubiKey / Universal 2nd Factor / HMAC-based One-time Password Algorithm / Time-based One-time Password Algorithm / One-time password / CCID / Dropbox / LastPass

YubiKey NEO-n • YubiKey NEO-n offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV) -- all with a simple tap or touch of a button • Works instantly wi

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:42
10Computer access control / Computer security / Security / Cryptography / Strong authentication / Authentication / Security token / EMV / Phishing / Identity theft / Password / Electronic authentication

EBF_019489 8th February 2016 EBA Discussion Paper on future Draft Regulatory Technical Standards on strong customer authentication and secure communication under the

Add to Reading List

Source URL: www.ebf-fbe.eu

Language: English - Date: 2016-02-10 08:34:16
UPDATE