Cryptographic protocol

Results: 1374



#Item
101Computing / Internet / Network architecture / Internet protocols / Internet Standards / Internet security / Domain name system / Cryptographic protocols / Border Gateway Protocol / Anycast / Router / Virtual private network

Communication Networks Spring 2016 Two weeks ago on Communication Networks Laurent Vanbever

Add to Reading List

Source URL: comm-net.ethz.ch

Language: English
102

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Author: Markku-Juhani O. Saarinen Presented by: Jean-Philippe Aumasson

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2014-02-27 17:44:42
    103Formal languages / Interpretation / Philosophy of mind / Semantics / Communications protocol / Model theory / Digital signature

    Programming Cryptographic Protocols? Joshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, and Brian T. Sniffen The MITRE Corporation Abstract. Cryptographic protocols are useful for trust engineering in

    Add to Reading List

    Source URL: evenmere.org

    Language: English - Date: 2008-06-23 12:11:50
    104Computing / Computer architecture / Computer network security / Wireless networking / IEEE 802.11 / Local area networks / Cryptographic protocols / Wireless / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Ubuntu / Cracking of wireless networks

    Connecting to the Rovernet WPA2 Secured Wireless Network with with UbuntuIntreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

    Add to Reading List

    Source URL: www.it.mtu.edu

    Language: English - Date: 2015-09-21 08:47:24
    105Internet protocols / Cryptographic protocols / Internet Standards / Secure communication / Network architecture / Border Gateway Protocol / Network address translation / Transport Layer Security / HTTPS / Internet protocol suite / Virtual private network

    Communication Networks Spring 2016 Laurent Vanbever www.vanbever.eu

    Add to Reading List

    Source URL: comm-net.ethz.ch

    Language: English - Date: 2016-05-22 14:43:12
    106Internet Standards / Computer networks / Cryptographic protocols / Internet protocols / Routing protocols / Border Gateway Protocol / AS3 / AS2 / Routing / AS1

    Stable Internet Routing Without Global Coordination Jennifer Rexford Lixin Gao Computer Science Smith College

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2005-01-14 14:19:59
    107Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: mitls.org

    Language: English
    108Computing / Technology / Computer networking / Named data networking / Virtual communities / Internet Relay Chat / Chronos / Cryptographic hash function / Transmission Control Protocol / Packet loss / Internet / Communications protocol

    NDN, Technical Report NDN-0008, 2012. http://named-data.net/techreports.html Revision 1: October 10, Chronos: Serverless Multi-User Chat Over NDN

    Add to Reading List

    Source URL: www.named-data.net

    Language: English - Date: 2013-08-09 21:32:20
    109Computer access control / Hypertext Transfer Protocol / Cryptographic protocols / Password / Security / Authentication / Phishing / HTTP cookie / Cryptographic nonce / Challengeresponse authentication / SQRL / HTTPS

    I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-07-05 13:35:58
    110Data security / Computer security / Security / National Institute of Standards and Technology / Federal Information Security Management Act / Security controls / Key management / Information security / Personally identifiable information / NIST Special Publication 800-53 / Managed Trusted Internet Protocol Service

    Draft SP 800-175A, Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-04-05 09:50:54
    UPDATE