Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 10 | Digital Books: 10 | Physical Books: 0

Azure Security for Critical Workloads: Implementing Modern Security Controls for Authentication, Authorization and Auditing

Subjects:

Published in: 2023

Availability: 1 of 1(eBook)

By: Sagar Lad

Entity authentication and key distribution

Subjects: Advances in Cryptology - Crypto '93 Lecture Notes in Computer Science Volume 773 authentication identification schemes key exchange

Published in: 101

Availability: 1 of 1(eBook)

By: Bellare M.

Essentially l-fold secure authentication systems

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 authentication codes

Published in: 101

Availability: 1 of 1(eBook)

By: Beutelspacher A.

Full secure key exchange and authentication with no previously shared secrets

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 key exchange authentication

Published in: 101

Availability: 1 of 1(eBook)

By: Domingo-Ferrer J.

How to keep authenticity alive in a computer network

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 key exchange authentication local area networks

Published in: 101

Availability: 1 of 1(eBook)

By: Bauspiess F.

Incremental Cryptography and Memory Checkers

Subjects: Advances in Cryptology - EuroCrypt '97 Lecture Notes in Computer Science Volume 1233 incremental hashing message authentication code

Published in: 101

Availability: 1 of 1(eBook)

By: Fischlin M.

Message authentication and dynamic passwords

Subjects: Advances in Cryptology - EuroCrypt '87 Lecture Notes in Computer Science Volume 304 authentication codes dynamic passwords

Published in: 101

Availability: 1 of 1(eBook)

By: Beker H. J.

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers, A Comprehensive and Practical Guide to PAM for Linux: How Modules Work and How to Implement Them

Subjects: Computer Security

Published in: 2006

Availability: 1 of 1(eBook)

By: Kenneth Geisshirt

Fresh Arrivals