To see the other types of publications on this topic, follow the link: Cryptography Authentication.

Books on the topic 'Cryptography Authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 35 books for your research on the topic 'Cryptography Authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

National Institute of Standards and Technology (U.S.). Entity authentication using public key cryptography. Information Technology Laboratory, National Institute of Standards and Technology, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Office, General Accounting. RCAS authentication. The Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Henzen, Luca. VLSI circuits for cryptographic authentication. Hartung-Gorre Verlag, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Waldvogel, Christian P. On the nature of authentication protocols. Hartung-Gorre, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tricia, Ballad, and Banks Erin K, eds. Access control, authentication, and public key infrastructure. Jones & Bartlett Learning, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

E, Smid Miles, Institute for Computer Sciences and Technology. Security Technology Group., and United States. National Bureau of Standards., eds. Message authentication code (MAC) validation system: Requirements and procedures. The Bureau, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Borivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lyons-Burke, Kathy. Federal agency use of public key technology for digital signatures and authentication. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

National Institute of Standards and Technology (U.S.), ed. Federal agency use of public key technology for digital signatures and authentication. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

National Institute of Standards and Technology (U.S.), ed. Federal agency use of public key technology for digital signatures and authentication. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Myasnikov, Alexei G. Non-commutative cryptography and complexity of group-theoretic problems. American Mathematical Society, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

1944-, Seberry Jennifer, Susilo Willy, and SpringerLink (Online service), eds. Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Martin, Keith M. Entity Authentication. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0008.

Full text
Abstract:
This chapter considers mechanisms for providing entity authentication. We begin with a discussion on randomness and why it is important in cryptography. We compare several different techniques for generating randomness. We then consider the related issue of freshness and why it is important for entity authentication. We compare several different techniques for providing freshness. We then identify various different categories of identification information which can be used in an entity authentication mechanism. We look at the role cryptography plays in supporting basic entity authentication me
APA, Harvard, Vancouver, ISO, and other styles
14

RCAS authentication. The Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lennon, Brian. Passwords: Philology, Security, Authentication. Harvard University Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Authentication codes and combinatorial designs. Taylor & Francis, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Pei, Dingyi. Authentication Codes and Combinatorial Designs. Taylor & Francis Group, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Pei, Dingyi. Authentication Codes and Combinatorial Designs. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Boonkrong, Sirapat. Authentication and Access Control: Practical Cryptography Methods and Tools. Apress L. P., 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pei, Dingyi. Authentication Codes and Combinatorial Designs. Taylor & Francis Group, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Access Control, Authentication, and Public Key Infrastructure. Jones & Bartlett Learning, LLC, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Passwords: Philology, Security, Authentication. Belknap Press: An Imprint of Harvard University Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Martin, Keith M. Basic Principles. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0001.

Full text
Abstract:
This chapter serves as an introduction to the environment in which cryptography finds common use today. We discuss the need for cryptography, as well as the basic language and concepts that are used to describe a cryptographic system. We introduce the core security services, such as confidentiality, data integrity, and authentication, which are delivered by cryptography in order to support modern security technologies. We introduce both symmetric and public-key cryptosystems, and discuss the differences between them. Finally, we consider ways in which cryptosystems can be attacked or compromis
APA, Harvard, Vancouver, ISO, and other styles
24

Lab Manual to Accompany Access Control, Authentication, and Public Key Infrastructure. Jones & Bartlett Learning, LLC, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Chapple, Mike, Tricia Ballad, Bill Ballad, and Erin Banks. Access Control, Authentication, and Public Key Infrastructure: Print Bundle. Jones & Bartlett Learning, LLC, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Furht, Borivoje, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Taylor & Francis Group, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Fachmedien Wiesbaden GmbH, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Pape, Sebastian. Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Pape, Sebastian. Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Viega, John, and Matt Messier. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation and More. O'Reilly Media, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Viega, John, and Matt Messier. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation and More. O'Reilly Media, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Federal agency use of public key technology for digital signatures and authentication. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mu, Yi, and Vijay Varadharajan. Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings. Springer London, Limited, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Martin, Keith M. Cryptographic Protocols. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0009.

Full text
Abstract:
This chapter is concerned with cryptographic protocols. We begin with an explanation of what components a cryptographic protocol consists of. We then illustrate the complexity of designing a secure cryptographic protocol by considering an artificially simple scenario, for which we propose and analyse seven candidate protocols. For each of these protocols, we comment on whether, or under which conditions, they meet the required specification. We go on to look at the important class of authentication and key establishment protocols. We identify typical goals and examine some important protocols
APA, Harvard, Vancouver, ISO, and other styles
35

Martin, Keith M. Data Integrity. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0006.

Full text
Abstract:
This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and H
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!