Cipher suite

Results: 202



#Item
151Internet / Internet standards / Cryptographic protocols / Secure communication / Electronic commerce / Transport Layer Security / Transmission Control Protocol / Stream Control Transmission Protocol / Cipher suite / Internet protocols / Network architecture / Computing

Version 1.0 Robin Seggelmann ([removed]) License: UVM, CC-BY-ND In this document the Datagram Transport Layer Security (DTLS) protocol, a modifcation of the Transmission Control Protocol (TCP) for unrelia

Add to Reading List

Source URL: robin-seggelmann.de

Language: English - Date: 2011-05-13 04:29:27
152Internet protocols / Computing / Cryptography / Internet standards / Computer network security / Transport Layer Security / Cipher suite / Phishing / Internet security / Cryptographic protocols / Secure communication / Security

eID Online Authentication Network Threat Model, Attacks and Implications Christian J. Dietrich1,2 , Christian Rossow1,3 , and Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirc

Add to Reading List

Source URL: www.cj2s.de

Language: English - Date: 2012-03-21 04:32:04
153C programming language / International Obfuscated C Code Contest / Language / Classical cipher / Linguistics / English phonology / Computer programming

D EPART MEN T OF THE NAVY OFFICE OF THE JUDGE ADVOCATE GENERAL WASHINGTON NAVY Y A RD[removed]PATT ERSON AVENUE SE SUITE 3000 WASH I NGTON DC[removed]

Add to Reading List

Source URL: www.jag.navy.mil

Language: English - Date: 2012-10-19 10:03:17
154Linguistics / Classical cipher / Speech Assessment Methods Phonetic Alphabet chart for English

Business Referral Network Come join us - We meet every 1st and 3rd Wednesdays, from 9:15am to 10:15am Meeting Location 2400 Camino Ramon, Suite 158/K, Bishop Ranch 6,

Add to Reading List

Source URL: res.cloudinary.com

Language: English - Date: 2013-06-04 11:10:53
155Cryptography standards / Key Wrap / Block cipher / Triple DES / Advanced Encryption Standard / Authenticated encryption / Key management / FIPS 140-2 / NSA Suite B Cryptography / Cryptography / Data Encryption Standard / Block cipher modes of operation

Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping (SP 800-38F)

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2013-01-10 14:24:21
156Classical cipher / International Obfuscated C Code Contest / Computer programming / Computing / Software engineering

STATE OF TENNESSEE DEPARTMENT OF TRANSPORTATION SUITE 700, JAMES K. POLK BUILDING NASHVILLE, TENNESSEE[removed][removed]GERALD F. NICELY

Add to Reading List

Source URL: www.tdot.state.tn.us

Language: English - Date: 2010-12-01 17:06:42
157C programming language / International Obfuscated C Code Contest / Classical cipher / Computer programming / Linguistics / Computing

ARKANSAS POLLUTION CONTROL & ECOLOGY COMMISSION 101 EAST CAPITOL SUITE 205 LITTLE ROCK, ARKANSAS[removed]PHONE: ([removed]FAX: ([removed]

Add to Reading List

Source URL: www.adeq.state.ar.us

Language: English - Date: 2012-02-01 17:23:23
158Computing / Key management / Public-key cryptography / Data / Internet / Certificate server / Public key certificate / Transport Layer Security / Cipher suite / Cryptographic protocols / Secure communication / Internet protocols

basic TLS handshake client hello server hello certificate server hello done

Add to Reading List

Source URL: www.g-sec.lu

Language: English - Date: 2009-09-23 11:00:28
159Internet standards / Internet / Cryptographic protocols / Secure communication / Directory services / Cipher suite / Lightweight Directory Access Protocol / Transport Layer Security / HTTPsec / Internet protocols / Computing / Data

Prototype PKD Interface Specification 2nd Edition 2 March 2005

Add to Reading List

Source URL: www.nmda.or.jp

Language: English - Date: 2005-03-08 00:24:37
160Secure communication / Cryptographic protocols / Elliptic curve cryptography / Cipher suite / Elliptic Curve DSA / Secure Shell / Bitcoin / Public-key cryptography / Key / Cryptography / Key management / Internet protocols

Elliptic Curve Cryptography in Practice Joppe W. Bos1 , J. Alex Halderman2 , Nadia Heninger3 , Jonathan Moore, Michael Naehrig1 , and Eric Wustrow2 1 Microsoft Research

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:16:28
UPDATE