[4687] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Hardware Authentication

daemon@ATHENA.MIT.EDU (Robert Hettinga)
Wed May 12 19:16:48 1999

Date: Wed, 12 May 1999 13:11:24 -0400
To: cryptography@c2.net
From: Robert Hettinga <rah@shipwright.com>


--- begin forwarded text


From: "Subba Rao" <subb3@ibm.net>
To: "DCSB" <dcsb@ai.mit.edu>
Date: Wed, 12 May 1999 10:25:56 -0400 (EDT)
Priority: Normal
Subject: Hardware Authentication
Sender: bounce-dcsb@ai.mit.edu
Reply-To: "Subba Rao" <subb3@ibm.net>

What are the various hardware authentication technologies that are available?

I am particularly interested in server to server authentication. iButton is
one of them
and I can't find any other hardware technologies that authenticate server
to server.
This is important, and will become important, as many service providers
merge to
provide new services.

Any pointers or info is appreciated.

Thank you in advance.

Subba Rao
subb3@ibm.net
==============================================================
Disclaimer - I question and speak for myself.

______________________________________________________________



For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".

--- end forwarded text


-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'


home help back first fref pref prev next nref lref last post