Cryptographic nonce

Results: 122



#Item
51Password / PKCS / Cryptographic nonce / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Programming Project #2 Winter 2001

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-02 14:56:31
52Computing / SHA-2 / London / W postcode area / Bitcoin / Cryptographic nonce / Crypt / Hash function / Cryptography / Cryptographic hash functions / Software

GOLDSTRIKETM 1: COINTERRA’S FIRST GENERATION CRYPTO-CURRENCY PROCESSOR FOR BITCOIN MINING MACHINES Javed Barkatullah, Ph.D., MBA Timo Hanke, Ph.D.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-12 14:05:46
53Network performance / Data / Datagram Congestion Control Protocol / Transmission Control Protocol / Sally Floyd / TCP/IP / Cryptographic nonce / Network congestion / Congestion window / Internet protocols / Network architecture / Computing

DCCP: Updates on CCID2 and CCID3 * Sally Floyd March, 2003 DCCP Working Group

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-05-12 11:58:39
54IPv6 / Computing / Network protocols / Internet Protocol / Mobile IP / Cryptographic nonce / Cryptographic hash function / Network architecture / Cryptography / OSI protocols

Mobile Location Changing version 1 (MLCv1)

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:23:33
55Security / Cryptographic protocols / Trusted computing / Internet protocols / Secure communication / Trusted Platform Module / Transport Layer Security / Cryptographic nonce / Direct Anonymous Attestation / Computer security / Cryptography / Computing

CS259 Project Report Security Analysis of Remote Attestation Lavina Jain ([removed]) Jayesh Vyas ([removed])

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2008-03-20 15:16:48
56Cryptographic protocols / HTTP / Internet protocols / Internet standards / Basic access authentication / Cryptographic nonce / Challenge-response authentication / Transport Layer Security / One-time password / Computing / Security / Data

Internet Engineering Task Force (IETF) Request for Comments: 7486 Category: Experimental ISSN: [removed]S. Farrell

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-03-10 20:46:32
57Data / Cryptographic protocols / Internet protocols / Digest access authentication / Request for Comments / Computer network security / Basic access authentication / Cryptographic nonce / Challenge-response authentication / Computing / HTTP / Internet

HTTP Authentication: Basic and Digest Access Authentication

Add to Reading List

Source URL: www.webdav.org

Language: English - Date: 2009-01-01 11:06:40
58Password / Cryptographic protocols / Cryptographic nonce / Electronic engineering / Digest access authentication / Computing / Security / ZRTP / Cryptography / Videotelephony / Session Initiation Protocol

Microsoft PowerPoint - VoIP Attack

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2008-11-05 16:52:50
59Cryptographic nonce / Cryptography / Cryptographic protocols / Public-key cryptography

CITI Technical Report 98−4 Implementation of a Provably Secure, Smartcard-based Key Distribution Protocol Rob Jerdonek Peter Honeyman

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 1999-01-07 15:19:43
60Internet protocols / Network protocols / Cryptographic protocols / IP multicast / Public-key cryptography / Multicast / Reliability / Communications protocol / Cryptographic nonce / Cryptography / Computing / Data

CITI Technical Report 98-2 Lightweight Secure Group Communication Patrick McDaniel [removed] Peter Honeyman [removed]

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 1999-01-07 15:17:43
UPDATE