Jump to content

User:Karjoth/Books/FS14-2

From Wikipedia, the free encyclopedia


Identification & Authentication
Passwords
Password
Password strength
Simple Authentication and Security Layer
One-time password
S/KEY
Password policy
Cryptographic Hash Functions
Cryptographic hash function
SHA-1
SHA-2
Message authentication code
Digital signature
Key generation
Symmetric-key algorithm
Stream cipher
Block cipher
Access Control Matrix
Computer security model
File system permissions
Reference monitor