Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Key authentication 38 found (49 total)

alternate case: key authentication

WolfSSH (278 words) [view diff] exact match in snippet view article find links to article

and an SSH server implementation. It allows for password and public key authentication. wolfSSH is currently available for Win32/64, Linux, macOS, Solaris
Wired Equivalent Privacy (2,883 words) [view diff] exact match in snippet view article find links to article
challenge frames in Shared Key authentication. Therefore, data can be more easily intercepted and decrypted with Shared Key authentication than with Open System
Electronic authentication (4,291 words) [view diff] case mismatch in snippet view article find links to article
2015. Office of the Government Chief Information Officer. "Public-Key Authentication". The Government of the Hong Kong Special Administrative Region of
TLS-PSK (306 words) [view diff] exact match in snippet view article find links to article
pre-shared key. The third set combine public key authentication of the server with pre-shared key authentication of the client. Usually, Transport Layer Security
Cerberus FTP Server (134 words) [view diff] exact match in snippet view article find links to article
via built-in users and groups, Active Directory, LDAP and public key authentication. The server is currently developed and supported by Cerberus, LLC
Spring Security (819 words) [view diff] no match in snippet view article find links to article
Spring Security is a Java/Java EE framework that provides authentication, authorization and other security features for enterprise applications. The project
YAK (cryptography) (850 words) [view diff] case mismatch in snippet view article
page. Hao, Feng (2010). "On Robust Key Agreement Based on Public Key Authentication" (PDF). Financial Cryptography and Data Security, LNCS 6052. 14th
Reptile (software) (167 words) [view diff] exact match in snippet view article
Summary (RSS), Sierra Reputation Management Framework (RMF), public key authentication, and Structured Query Language (SQL) result to XML serialization,
BestCrypt (371 words) [view diff] exact match in snippet view article find links to article
copies of data to complement encryption. Secret sharing and Public Key authentication methods in addition to basic password-based authentication. BestCrypt
Ssh-keygen (717 words) [view diff] exact match in snippet view article find links to article
ssh/authorized_keys on all computers where a user wishes to log in using public key authentication. $HOME/.ssh/identity: The $HOME/.ssh/identity file contains the RSA
PuTTY (633 words) [view diff] exact match in snippet view article find links to article
alternate ciphers such as AES, 3DES, RC4, Blowfish, DES, and public-key authentication. PuTTY uses its own format of key files – PPK (protected by Message
ECRYPT (606 words) [view diff] exact match in snippet view article find links to article
ECIES-KEM; signature schemes such as RSA-PSS, DSA and ECDSA; and public key authentication and identification algorithm GQ. Note that the list of algorithms
CopSSH (264 words) [view diff] exact match in snippet view article find links to article
Tevfik (2005-03-31). "copSSH - a cygwin+openssh package with public key authentication support on windows 2003". SecurityFocus Secure Shell mailing list
Telnet (2,464 words) [view diff] exact match in snippet view article find links to article
sensitive data such as passwords from being intercepted, and public key authentication, to ensure that the remote computer is actually who it claims to be
NTRUSign (628 words) [view diff] case mismatch in snippet view article find links to article
Silverman, Joseph H. (1999). "Polynomial Rings and Efficient Public Key Authentication" (PDF). International Workshop on Cryptographic Techniques and E-Commerce
Comparison of SSH clients (712 words) [view diff] exact match in snippet view article find links to article
buffer Mouse input support Unicode support URL hyperlinking Public key authentication Smart card support Hardware encryption FIPS 140-2 validation Scripting
Authenticated encryption (2,104 words) [view diff] no match in snippet view article find links to article
(message authentication code or MAC). Decryption Input: ciphertext, key, authentication tag, and optionally a header (if used during the encryption). Output:
FTPS (1,569 words) [view diff] exact match in snippet view article find links to article
cryptographic protocols, including the use of server-side public key authentication certificates and client-side authorization certificates. It also supports
Gavin Lowe (computer scientist) (577 words) [view diff] exact match in snippet view article
Gavin (November 1995). "An attack on the Needham-Schroeder public key authentication protocol". Information Processing Letters. 56 (3): 131–136. CiteSeerX 10
OpenSSH (2,781 words) [view diff] exact match in snippet view article find links to article
standard methods supported by the SSH protocol: with a password; public-key authentication, using per-user keys; host-based authentication, which is a secure
Secure Real-time Transport Protocol (1,132 words) [view diff] exact match in snippet view article find links to article
DTLS-SRTP uses the DTLS protocol to deliver master key, and allows public key authentication. See Comparison of VoIP software § Secure VoIP software for phones
List of DNS record types (667 words) [view diff] exact match in snippet view article find links to article
RFC 2930..." RFC 2931, §2.4. "SIG(0) on the other hand, uses public key authentication, where the public keys are stored in DNS as KEY RRs and a private
GameSpy Technology (257 words) [view diff] exact match in snippet view article find links to article
authentication, game invites, and instant messaging Player chat rooms CD key authentication Voice communication HTTP, XML, and socket data transport Microsoft
MQV (1,743 words) [view diff] case mismatch in snippet view article find links to article
S2CID 15540513. F. Hao, On Robust Key Agreement Based on Public Key Authentication. Proceedings of the 14th International Conference on Financial Cryptography
HP Integrated Lights-Out (1,063 words) [view diff] exact match in snippet view article find links to article
operations SSH remote network access to iLO card supporting public key authentication, 1024 bit DSA key, at least since iLO 3 iLO Federation Two factor
ZOC (software) (555 words) [view diff] exact match in snippet view article
Secure Shell (SSH V1/V2) based on OpenSSH 8.1 with public/private key authentication, port forwarding (tunneling) and Smart Card support. Telnet (RFC-Telnet
Comparison of open-source configuration management software (3,774 words) [view diff] exact match in snippet view article find links to article
keys for mutual authentication. "As an option, you can use secret key authentication to prove the master's identity to the slave. [...] If one managed
WebAuthn (3,026 words) [view diff] exact match in snippet view article find links to article
Public-key authentication standard
S/KEY (1,298 words) [view diff] case mismatch in snippet view article find links to article
S/KEY authentication
Neural cryptography (2,220 words) [view diff] exact match in snippet view article find links to article
concept of using synchronized neural networks to achieve a public key authentication system. Li, Li-Hua; Lin, Luon-Chang; Hwang, Min-Shiang (November 2001)
Safari (web browser) (10,888 words) [view diff] exact match in snippet view article
such as prompting users to change weak passwords, FIDO2 USB security key authentication support, Sign in with Apple support, Apple Pay on the Web support
List of CDMA terminology (1,116 words) [view diff] no match in snippet view article find links to article
numbers. Also See PN Offset. AKA – Authentication and Key Agreement A-keyAuthentication Key – See CAVE-based Authentication AMPS – Advanced Mobile Phone
Needham–Schroeder protocol (2,192 words) [view diff] exact match in snippet view article find links to article
Gavin (November 1995). "An attack on the Needham–Schroeder public key authentication protocol". Information Processing Letters. 56 (3): 131–136. CiteSeerX 10
Digest access authentication (2,879 words) [view diff] exact match in snippet view article find links to article
web-based applications that are occasionally used include: Public key authentication (usually implemented with a HTTPS / SSL client certificate) using
IEEE 802.11 (10,772 words) [view diff] exact match in snippet view article find links to article
frame of its own indicating acceptance or rejection. When shared key authentication is being used, the WNIC sends an initial authentication request, and
Communicating sequential processes (5,757 words) [view diff] exact match in snippet view article find links to article
discover a previously unknown attack on the Needham–Schroeder public-key authentication protocol, and then to develop a corrected protocol able to defeat
Token Binding (1,029 words) [view diff] exact match in snippet view article find links to article
Credentials. Web Authentication (WebAuthn), an interface for public-key authentication of users to web-based applications and services, supports Token Binding
MIFARE (6,975 words) [view diff] exact match in snippet view article find links to article
similar to MIFARE DESFire EV2/EV3, but with added support for public-key authentication. Unlike DESFire, DUOX chips no longer support the deprecated DES algorithm