Cryptographic nonce

Results: 122



#Item
21Security / Dolev-Yao model / Authentication protocol / Cryptography / Cryptographic nonce / Communications protocol / Authentication / Π-calculus / Cryptographic protocols / Data / Information

ACI ROSSIGNOL Denis LUGIEZ www.cmi.univ-mrs.fr/ lugiez/aci-rossignol.html 

Add to Reading List

Source URL: www.irisa.fr

Language: English - Date: 2003-12-17 02:53:50
22Cryptography / Computing / Bitcoin / Peer-to-peer computing / Business / Electronic commerce / Cryptographic nonce / Electronic money / Peer-to-peer / Payment systems / Software / Financial cryptography

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O. Karame NEC Laboratories EuropeHeidelberg, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-03 04:11:29
23Cryptographic protocols / HTTP / Password / Challenge-response authentication / Two-factor authentication / Security token / Digest access authentication / Cryptographic nonce / Authentication / Security / Cryptography / Computer security

CHAPTER 3 Protocols It is impossible to foresee the consequences of being clever.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:54
24Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:55
25Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: bravenewcoin.com

Language: English - Date: 2014-07-15 20:21:51
26Information / Reflection attack / Cryptographic nonce / Password authentication protocol / Public-key cryptography / Otway–Rees protocol / Needham–Schroeder protocol / Cryptography / Cryptographic protocols / Data

Dynamic Types for Authentication ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2009-01-08 08:47:19
27Technology / Ubiquitous computing / Wireless / Surveillance / Authentication protocol / Cryptographic nonce / Automatic identification and data capture / Radio-frequency identification / Human–computer interaction

1 Securing Low-cost RFID Systems: an Unconditionally Secure Approach Basel Alomair a , Loukas Lazos b , and Radha Poovendran a a

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-04-26 12:59:27
28Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / RSA / Otway–Rees protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Authenticity by Tagging and Typing ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Università Ca’Foscari di Venezia

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:43:38
29Mathematics / Prime-counting function / Cryptographic nonce / Π-calculus / Data / Cyberwarfare / Otway–Rees protocol / Cryptographic protocols / Cryptography / Reflection attack

Compositional Analysis of Authentication Protocols ? Michele Bugliesi, Riccardo Focardi, and Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy {mi

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:44:01
30Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Cryptographic hash function / Security token / Hash chain / Transport Layer Security / Cryptographic nonce / Computing / Cryptography / Internet

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-07-20 15:18:58
UPDATE