Applied Cryptography and Network Security

Results: 16



#Item
1

ACNS’08 6th International Conference on Applied Cryptography and Network Security 3~6 June 2008, N. York

Add to Reading List

Source URL: acns2008.cs.columbia.edu

Language: English - Date: 2008-04-22 13:49:58
    2

    ACNS ’15 13th International Conference on Applied Cryptography and Network Security 2–5 June 2015, New York Columbia University

    Add to Reading List

    Source URL: acns2015.cs.columbia.edu

    Language: English - Date: 2014-10-31 17:51:16
      3Security / Computing / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Denial-of-service attack / Threat / Critical infrastructure protection / Internet / Vulnerability

      An ideal Internet Early Warning System Dominique Petersen and Norbert Pohlmann Institute for Internet Security University of Applied Sciences Gelsenkirchen {petersen, pohlmann}@internet-sicherheit.de Abstract

      Add to Reading List

      Source URL: norbert-pohlmann.com

      Language: English - Date: 2015-10-20 12:57:45
      4Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

      eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

      Add to Reading List

      Source URL: norbert-pohlmann.com

      Language: English - Date: 2015-10-20 13:18:07
      5

      Call for Papers: 3rd Applied Cryptography and Network Security Conference (ACNSJune 7-10, 2005 Columbia University, New York, NY, USA http://acns2005.cs.columbia.edu

      Add to Reading List

      Source URL: acns2005.cs.columbia.edu

      Language: English - Date: 2004-11-01 17:09:17
        6

        3rd Applied Cryptography and Network Security Conference (ACNS) 2005 June 7­10, 2005 Columbia University, New York, NY, USA http://acns2005.cs.columbia.edu

        Add to Reading List

        Source URL: acns2005.cs.columbia.edu

        Language: English - Date: 2005-06-13 12:14:40
          7Computer security / Computing / Cryptography / Computer network security / Trusted computing / IPsec / Cryptographic software / Cryptographic protocols / StrongSwan / Trusted Network Connect / IF-MAP / Internet Key Exchange

          The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

          Add to Reading List

          Source URL: www.strongswan.org

          Language: English - Date: 2012-08-29 15:32:53
          8Security token / Keychain / Authentication protocol / Applied Cryptography and Network Security / AKA / Cryptography / Cryptographic protocols / MIFARE

          PDF Document

          Add to Reading List

          Source URL: icsd.i2r.a-star.edu.sg

          Language: English - Date: 2012-06-13 22:48:00
          9Cryptography / Computer network security / Technology / IEEE 802.11 / Wi-Fi / Wpa supplicant / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / Wireless networking / Cryptographic protocols / Computing

          PROXIM AND WI-FI PROTECTED ACCESS (WPA) What is WPA? As an intermediate WLAN security solution that can be applied to existing WLAN client hardware, the Wi-Fi Alliance has adopted Wi-Fi Protected Access (WPA). Proxim wil

          Add to Reading List

          Source URL: www.nowire.se

          Language: English - Date: 2014-11-12 08:22:48
          10Applied mathematics / Ciphertext indistinguishability / Cipher / Semantic security / RSA / Mix network / Public-key cryptography / Encryption / ElGamal encryption / Cryptography / Cyberwarfare / Security

          Security Analysis of Re-Encryption RPC Mix Nets Ralf K¨usters and Tomasz Truderung University of Trier, Germany {kuesters,truderung}@uni-trier.de Abstract. Re-Encryption randomized partial checking (RPC) mix nets were

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-03-29 05:22:29
          UPDATE