Cryptographic engineering

Results: 331



#Item
131Radio-frequency identification / Software engineering / Traceability / Timestamp / Clock / Public key certificate / Technology / Telecommunications engineering / Electronic engineering / Time / Horology / Barcodes

DATASHEET Cryptographic Auditable Timestamps Sovereign Time™ was established in 2003 and developed to deliver a source of trusted auditable and verifiable time to our customers in the DoD, commercial, legal and intern

Add to Reading List

Source URL: www.wetstonetech.com

Language: English - Date: 2014-11-26 14:07:54
132Cryptographic protocols / HTTP / Internet protocols / Internet standards / Basic access authentication / Cryptographic nonce / Challenge-response authentication / Transport Layer Security / One-time password / Computing / Security / Data

Internet Engineering Task Force (IETF) Request for Comments: 7486 Category: Experimental ISSN: [removed]S. Farrell

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-03-10 20:46:32
133Search algorithms / Information retrieval / Cryptographic hash functions / Hash function / Hash table / Trie / Rabin–Karp algorithm / Search engine indexing / SHA-1 / Information science / Hashing / Error detection and correction

Extremely Fast Text Feature Extraction for Classification and Indexing George Forman, Evan Kirshenbaum HP Laboratories HPL-2008-91R1 Keyword(s): text mining, text indexing, bag-of-words, feature engineering, feature extr

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2008-08-21 19:05:04
134Information / Computer network security / Wireless networking / Network protocols / Extensible Authentication Protocol / EAP-SIM / Internet Protocol / Proxy Mobile IPv6 / IEEE 802.1X / Cryptographic protocols / Computing / Data

Internet Engineering Task Force (IETF) Request for Comments: 7458 Category: Informational ISSN: [removed]R. Valmikam

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-02-26 18:22:54
135Wireless / Wi-Fi / Cryptographic protocols / Wireless LAN / Telecommunications engineering / Wireless router / Wireless network / Wireless networking / Technology / Computer network security

User Guide LV001 LV001-B Version 5.0 Software v257-a-865-a-122

Add to Reading List

Source URL: www.livioradio.com

Language: English - Date: 2010-08-24 15:54:15
136Computer network security / Telecommunications engineering / Computing / Cryptographic protocols / Wireless distribution system / Local area networks / Wireless LAN / Wi-Fi / Wireless network interface controller / Wireless networking / Technology / IEEE 802.11

TECHNICAL MANUAL TRIMAR 802.11a/b/g AP/REPEATER PEGASUS WIRELESS CORPORATION TRIMAR TECHNICAL MANUAL

Add to Reading List

Source URL: www.otcwireless.com

Language: English - Date: 2014-07-06 10:14:09
137Public-key cryptography / Internet protocols / Homomorphic encryption / Secret sharing / HMAC / Encryption / Cryptographic hash function / Wireless sensor network / Database / Cryptography / Cryptographic protocols / Hashing

Secure and Efficient In-Network Processing of Exact SUM Queries Stavros Papadopoulos 1 , Aggelos Kiayias 2 , Dimitris Papadias 3 1 Department of Computer Science and Engineering

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:45
138Software / Man-in-the-middle attack / Electromagnetism / Electrical engineering / Relay / Internet privacy / Cryptographic software / Tor

Surfing safely over the Tor anonymity network Georg Koppen – Philipp Winter – How does Tor work?

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-03-20 15:08:09
139Computer network security / Server appliance / Cisco ASA / Online Certificate Status Protocol / Joint Interoperability Test Command / Cisco Systems / Defense Information Systems Agency / Internet / Electronic engineering / Computing / Videotelephony / Cryptographic protocols

Microsoft Word - Cisco ASA VPN IO Cert Ext DTR1[removed]Aug 2014.docx

Add to Reading List

Source URL: jitc.fhu.disa.mil

Language: English - Date: 2014-08-21 09:00:13
140Cryptographic hash functions / Public-key cryptography / Secure communication / MD2 / MD4 / SHA-2 / SHA-1 / PKCS / X.509 / Cryptography / Cryptographic protocols / Hashing

Internet Engineering Task Force (IETF) Request for Comments: 6149 Obsoletes: 1319 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-03-07 21:32:56
UPDATE