Challenge-response authentication

Results: 139



#Item
41Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Bruce Schneier Mudge Counterpane Systems L0pht Heavy Industries

Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Bruce Schneier Mudge Counterpane Systems L0pht Heavy Industries

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
42The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs Patrick Gage Kelley*, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Tim Vidas, Lujo Bauer, Nicolas Ch

The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs Patrick Gage Kelley*, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Tim Vidas, Lujo Bauer, Nicolas Ch

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-11-20 15:29:50
43Cryptanalysis of a Cognitive Authentication Scheme Philippe Golle, PARC David Wagner, UC Berkeley  Problem Statement

Cryptanalysis of a Cognitive Authentication Scheme Philippe Golle, PARC David Wagner, UC Berkeley Problem Statement

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
44Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) Philippe Golle Palo Alto Research Center [removed]

Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) Philippe Golle Palo Alto Research Center [removed]

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-03-09 13:40:40
45The paper begins on the next page. Before you begin reading, we have a request... Please Help Make This Study Better. Take Part by Contributing Data! The data in our study is collected by a script that has been carefully

The paper begins on the next page. Before you begin reading, we have a request... Please Help Make This Study Better. Take Part by Contributing Data! The data in our study is collected by a script that has been carefully

Add to Reading List

Source URL: nms.csail.mit.edu

Language: English - Date: 2005-06-21 15:53:34
46Myths and Misunderstandings about Speaker Authentication A white paper by Dr. Judith A. Markowitz, president J. Markowitz, Consultants Introduction Speaker authentication is a biometric technology that uses the acoustic

Myths and Misunderstandings about Speaker Authentication A white paper by Dr. Judith A. Markowitz, president J. Markowitz, Consultants Introduction Speaker authentication is a biometric technology that uses the acoustic

Add to Reading List

Source URL: www.jmarkowitz.com

Language: English - Date: 2010-06-09 15:30:54
47YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2005-12-06 23:10:45
48Internet Engineering Task Force (IETF) Request for Comments: 7486 Category: Experimental ISSN: [removed]S. Farrell

Internet Engineering Task Force (IETF) Request for Comments: 7486 Category: Experimental ISSN: [removed]S. Farrell

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-03-10 20:46:32
49Oracle authentication László Tóth [removed] Disclaimer

Oracle authentication László Tóth [removed] Disclaimer

Add to Reading List

Source URL: soonerorlater.hu

Language: English - Date: 2010-03-21 10:35:17
50Secure (One-Time-) Password Authentication for the Globus Toolkit Olivier Chevassut (Lawrence Berkeley National Laboratory)  Frank Siebenlist

Secure (One-Time-) Password Authentication for the Globus Toolkit Olivier Chevassut (Lawrence Berkeley National Laboratory) Frank Siebenlist

Add to Reading List

Source URL: toolkit.globus.org

Language: English - Date: 2006-04-13 14:21:19