Sameer Ratolikar, the CISO at Bank of India still vividly remembers 2008-‘09’s tough days when the bank’s customers were victimized by cyber frauds. With its strong online banking drive, the need of ...
Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is ...
The 13.56 MHz device has a 64-bit embedded cryptographic engine. In an effort to help combat product counterfeiting, Atmel Corp. has created the CryptoRF, which is a 13.56 MHz RFID device with a ...
If you are serious about computer/network security, then you must have a solid understanding of authentication methods. Debra Littlejohn Shinder takes a moment to lay out the role authentication plays ...
Authernative, Inc., the developer of innovative user authentication and identity management technologies, announced today that the United States Patent & Trademark Office has granted the company its ...