Cryptographic nonce

Results: 122



#Item
31Hardware security module / Security / Cryptographic nonce / Block cipher / EAX mode / Cryptography / Block cipher modes of operation / One-time password

YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubico

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2015-04-13 14:47:47
32Cyberwarfare / Cryptographic protocols / Computer security / Kerberos / Key distribution center / Needham–Schroeder protocol / Key / Cryptographic nonce / Woo–Lam / Cryptography / Computer network security / Key management

Lecture 10: Key Distribution for Symmetric Key Cryptography and Generating Random Numbers Lecture Notes on “Computer and Network Security” by Avi Kak () February 17, :26am

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-17 00:27:22
33Kerberos / Needham–Schroeder protocol / Cryptographic nonce / Public-key cryptography / IP / Cryptographic protocols / Cryptography / Computer network security

Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:22:30
34Cryptographic protocols / Computing / Burrows–Abadi–Needham logic / Cryptographic nonce / Challenge-response authentication / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / Cryptography / Data / Information

Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:52:04
35X.509 / Public key infrastructure / PKCS / Credential / Cryptographic nonce / Cryptography / Public-key cryptography / Digital signature

Alpaca: Extensible Authorization for Distributed Services Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Morris, and M. Frans Kaashoek MIT CSAIL Cambridge, MA, USA {ctl,

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-11-10 14:15:06
36Bitcoin / Peer-to-peer computing / Computer networking / File sharing networks / Peer-to-peer / Node / Cryptographic nonce / Proxy server / Tor / Computing / Software / Internet privacy

Deanonymisation of Clients in Bitcoin P2P Network Alex Biryukov Dmitry Khovratovich Ivan Pustogarov

Add to Reading List

Source URL: orbilu.uni.lu

Language: English - Date: 2014-11-05 11:20:27
37Non-interactive zero-knowledge proof / Zero-knowledge proof / Proof-of-work system / Proof of knowledge / Random oracle / Commitment scheme / Cryptographic nonce / NP / IP / Cryptography / Cryptographic protocols / Bitcoin

Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity Christina Garman, Matthew Green, Ian Miers, and Aviel D. Rubin The Johns Hopkins University Department of Computer Science, Baltimore, USA {cgarman

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-18 12:20:10
38Computing / Malware / Cryptographic nonce / Bluetooth / Computer network / Electronic engineering / Computer network security / Wireless security / Extensible Authentication Protocol / Technology / Mobile computers / Mobile device management

Enabling Users to Self-Manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks Zheng Dong School of Informatics and Computing, Indiana University, Bloomington, IN, USA Abstr

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2012-08-12 01:47:18
39Internet / Datagram Congestion Control Protocol / Transport layer / Transmission Control Protocol / Cryptographic nonce / Port / Ip / Internet protocols / Network architecture / Computing

Internet Engineering Task Force INTERNET-DRAFT draft-kohler-dccp-mobility-02.ps Expires: 25 DecemberEddie Kohler

Add to Reading List

Source URL: www.read.cs.ucla.edu

Language: English - Date: 2006-06-26 00:44:34
40Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.altcoinfever.com

Language: English - Date: 2014-01-01 18:43:09
UPDATE