Cryptographic protocol

Results: 1374



#Item
111Secure communication / Public-key cryptography / Elliptic curve cryptography / Cryptographic protocols / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / HTTPS / Elliptic curve DiffieHellman / Handshaking / RSA

A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov

Add to Reading List

Source URL: securewww.esat.kuleuven.be

Language: English
112Cryptography / Applied mathematics / Computer security / Advantage / Provable security / Cryptographic protocol / Data Encryption Standard / DolevYao model / NeedhamSchroeder protocol

A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:52
113Internet protocols / Cryptographic protocols / Secure communication / Transport Layer Security / Hypertext Transfer Protocol / World Wide Web / HTTPS / Subdomain

#wcchi #AdvancedWPChi WordCamp Chicago 2016 SEO Audit Techniques Ryan Erwin

Add to Reading List

Source URL: internetmarketing.chicago.com

Language: English - Date: 2016-05-01 12:31:45
114Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / Cryptographic protocols / Public key certificate / Certificate authority / Certificate policy / X.509 / Revocation list / Online Certificate Status Protocol

Amazon Trust Services Certificate Policy Version

Add to Reading List

Source URL: www.amazontrust.com

Language: English - Date: 2015-12-17 09:54:23
115Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
116Computing / Cryptography / Internet / Internet protocols / Transport Layer Security / Cryptographic protocols / Internet security / Internet Standards / Cloudflare / SPDY / HTTP/2 / Online Certificate Status Protocol

HTTPS is Fast and Hassle-free with CloudFlareFLARE | | www.cloudflare.com In the past, organizations had to choose between performance

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2016-04-15 17:06:26
117Security / Computer security / Cyberwarfare / Formal methods / Logic in computer science / E-commerce / Secure communication / Cryptographic software / Formal verification / Cryptographic protocol / Vulnerability / ProVerif

More Secure Software Systems by Formal Verification, Property-Based Testing, Secure Compilation, and Dynamic Monitoring Cătălin Hrițcu Inria Paris, Prosecco team

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2015-12-15 12:26:17
118Computing / Email / Cyberspace / Internet privacy / Secure communication / Opportunistic TLS / Transport Layer Security / Simple Mail Transfer Protocol / Extended SMTP / Email encryption / Opportunistic encryption / Gmail

Uncovering Cryptographic Failures 
 with Internet-Wide Measurement Zakir Durumeric University of Michigan

Add to Reading List

Source URL: zakird.com

Language: English
119Computing / Internet / Cyberspace / Email / Internet protocols / Spam filtering / Cryptographic protocols / Opportunistic TLS / Simple Mail Transfer Protocol / DMARC / Transport Layer Security / DomainKeys Identified Mail

Neither Snow Nor Rain Nor MITMAn Empirical Analysis of Email Delivery Security Zakir Durumeric† David Adrian† Ariana Mirian† James Kasten† Elie Bursztein‡ Nicolas Lidzborski‡ Kurt Thomas‡ Vijay Erant

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-11-02 23:42:17
120Cryptography / Public-key cryptography / Cryptographic protocol / Transmission Control Protocol / Digital signature / Communications protocol

UNIVERSITY OF CALIFORNIA, IRVINE Sharing Sensitive Information with Privacy DISSERTATION

Add to Reading List

Source URL: emilianodc.com

Language: English - Date: 2014-11-28 06:44:18
UPDATE