language:
Find link is a tool written by Edward Betts.searching for Key authentication 38 found (49 total)
alternate case: key authentication
WolfSSH
(278 words)
[view diff]
exact match in snippet
view article
find links to article
and an SSH server implementation. It allows for password and public key authentication. wolfSSH is currently available for Win32/64, Linux, macOS, SolarisWired Equivalent Privacy (2,897 words) [view diff] exact match in snippet view article find links to article
challenge frames in Shared Key authentication. Therefore, data can be more easily intercepted and decrypted with Shared Key authentication than with Open SystemElectronic authentication (4,218 words) [view diff] case mismatch in snippet view article find links to article
2015. Office of the Government Chief Information Officer. "Public-Key Authentication". The Government of the Hong Kong Special Administrative Region ofTLS-PSK (306 words) [view diff] exact match in snippet view article find links to article
pre-shared key. The third set combine public key authentication of the server with pre-shared key authentication of the client. Usually, Transport Layer SecuritySpring Security (819 words) [view diff] no match in snippet view article find links to article
Spring Security is a Java/Java EE framework that provides authentication, authorization and other security features for enterprise applications. The projectCerberus FTP Server (148 words) [view diff] exact match in snippet view article find links to article
via built-in users and groups, Active Directory, LDAP and public key authentication. Cerberus FTP Server was acquired by Redwood Software in 2023, whichYAK (cryptography) (850 words) [view diff] case mismatch in snippet view article
page. Hao, Feng (2010). "On Robust Key Agreement Based on Public Key Authentication" (PDF). Financial Cryptography and Data Security, LNCS 6052. 14thReptile (software) (167 words) [view diff] exact match in snippet view article
Summary (RSS), Sierra Reputation Management Framework (RMF), public key authentication, and Structured Query Language (SQL) result to XML serialization,BestCrypt (371 words) [view diff] exact match in snippet view article find links to article
copies of data to complement encryption. Secret sharing and Public Key authentication methods in addition to basic password-based authentication. BestCryptSsh-keygen (717 words) [view diff] exact match in snippet view article find links to article
ssh/authorized_keys on all computers where a user wishes to log in using public key authentication. $HOME/.ssh/identity: The $HOME/.ssh/identity file contains the RSAPuTTY (633 words) [view diff] exact match in snippet view article find links to article
alternate ciphers such as AES, 3DES, RC4, Blowfish, DES, and public-key authentication. PuTTY uses its own format of key files – PPK (protected by MessageECRYPT (606 words) [view diff] exact match in snippet view article find links to article
ECIES-KEM; signature schemes such as RSA-PSS, DSA and ECDSA; and public key authentication and identification algorithm GQ. Note that the list of algorithmsNTRUSign (628 words) [view diff] case mismatch in snippet view article find links to article
Silverman, Joseph H. (1999). "Polynomial Rings and Efficient Public Key Authentication" (PDF). International Workshop on Cryptographic Techniques and E-CommerceCopSSH (264 words) [view diff] exact match in snippet view article find links to article
Tevfik (2005-03-31). "copSSH - a cygwin+openssh package with public key authentication support on windows 2003". SecurityFocus Secure Shell mailing listAuthenticated encryption (2,104 words) [view diff] no match in snippet view article find links to article
(message authentication code or MAC). Decryption Input: ciphertext, key, authentication tag, and optionally a header (if used during the encryption). Output:Telnet (2,476 words) [view diff] exact match in snippet view article find links to article
sensitive data such as passwords from being intercepted, and public key authentication, to ensure that the remote computer is actually who it claims to beFTPS (1,569 words) [view diff] exact match in snippet view article find links to article
cryptographic protocols, including the use of server-side public key authentication certificates and client-side authorization certificates. It also supportsGavin Lowe (computer scientist) (577 words) [view diff] exact match in snippet view article
Gavin (November 1995). "An attack on the Needham-Schroeder public key authentication protocol". Information Processing Letters. 56 (3): 131–136. CiteSeerX 10OpenSSH (2,781 words) [view diff] exact match in snippet view article find links to article
standard methods supported by the SSH protocol: with a password; public-key authentication, using per-user keys; host-based authentication, which is a secureComparison of SSH clients (726 words) [view diff] exact match in snippet view article find links to article
buffer Mouse input support Unicode support URL hyperlinking Public key authentication Smart card support Hardware encryption FIPS 140-2 validation ScriptingSecure Real-time Transport Protocol (1,132 words) [view diff] exact match in snippet view article find links to article
DTLS-SRTP uses the DTLS protocol to deliver master key, and allows public key authentication. See Comparison of VoIP software § Secure VoIP software for phonesList of DNS record types (667 words) [view diff] exact match in snippet view article find links to article
RFC 2930..." RFC 2931, §2.4. "SIG(0) on the other hand, uses public key authentication, where the public keys are stored in DNS as KEY RRs and a privateGameSpy Technology (257 words) [view diff] exact match in snippet view article find links to article
authentication, game invites, and instant messaging Player chat rooms CD key authentication Voice communication HTTP, XML, and socket data transport MicrosoftMQV (1,743 words) [view diff] case mismatch in snippet view article find links to article
S2CID 15540513. F. Hao, On Robust Key Agreement Based on Public Key Authentication. Proceedings of the 14th International Conference on Financial CryptographyHP Integrated Lights-Out (1,080 words) [view diff] exact match in snippet view article find links to article
operations SSH remote network access to iLO card supporting public key authentication, 1024 bit DSA key, at least since iLO 3 iLO Federation Two factorComparison of open-source configuration management software (3,774 words) [view diff] exact match in snippet view article find links to article
keys for mutual authentication. "As an option, you can use secret key authentication to prove the master's identity to the slave. [...] If one managedZOC (software) (555 words) [view diff] exact match in snippet view article
Secure Shell (SSH V1/V2) based on OpenSSH 8.1 with public/private key authentication, port forwarding (tunneling) and Smart Card support. Telnet (RFC-TelnetWebAuthn (3,086 words) [view diff] exact match in snippet view article find links to article
Public-key authentication standardS/KEY (1,298 words) [view diff] case mismatch in snippet view article find links to article
S/KEY authenticationList of CDMA terminology (1,116 words) [view diff] no match in snippet view article find links to article
numbers. Also See PN Offset. AKA – Authentication and Key Agreement A-key – Authentication Key – See CAVE-based Authentication AMPS – Advanced Mobile PhoneNeural cryptography (2,224 words) [view diff] exact match in snippet view article find links to article
concept of using synchronized neural networks to achieve a public key authentication system. Li, Li-Hua; Lin, Luon-Chang; Hwang, Min-Shiang (November 2001)Needham–Schroeder protocol (2,192 words) [view diff] exact match in snippet view article find links to article
Gavin (November 1995). "An attack on the Needham–Schroeder public key authentication protocol". Information Processing Letters. 56 (3): 131–136. CiteSeerX 10Safari (web browser) (10,889 words) [view diff] exact match in snippet view article
such as prompting users to change weak passwords, FIDO2 USB security key authentication support, Sign in with Apple support, Apple Pay on the Web supportDigest access authentication (2,879 words) [view diff] exact match in snippet view article find links to article
web-based applications that are occasionally used include: Public key authentication (usually implemented with a HTTPS / SSL client certificate) usingCommunicating sequential processes (5,757 words) [view diff] exact match in snippet view article find links to article
discover a previously unknown attack on the Needham–Schroeder public-key authentication protocol, and then to develop a corrected protocol able to defeatIEEE 802.11 (10,808 words) [view diff] exact match in snippet view article find links to article
frame of its own indicating acceptance or rejection. When shared key authentication is being used, the WNIC sends an initial authentication request, andToken Binding (1,029 words) [view diff] exact match in snippet view article find links to article
Credentials. Web Authentication (WebAuthn), an interface for public-key authentication of users to web-based applications and services, supports Token BindingMIFARE (6,975 words) [view diff] exact match in snippet view article find links to article
similar to MIFARE DESFire EV2/EV3, but with added support for public-key authentication. Unlike DESFire, DUOX chips no longer support the deprecated DES algorithm