Cryptographic protocol

Results: 1374



#Item
131Cryptography / Theoretical computer science / E-commerce / Secure communication / Model checking / Cryptographic protocol / Public-key cryptography / Communications protocol / Formal methods / Computer security / Secure multi-party computation

Secure Protocols for Secrecy Hanane Houmani and Mohamed Mejri LSFM Research Group Computer Science Department LAVAL University Quebec, Canada

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
132Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-09 21:16:55
133

0 Cryptographic Protocol Verification via Supercompilation (A Case Study) Abdulbasit Ahmed

Add to Reading List

Source URL: refal.botik.ru

Language: English - Date: 2013-07-20 09:49:45
    134Computing / Cryptography / Computer network security / Computer security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol

    The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2010-06-11 08:24:10
    135Cryptographic software / Secure Shell / Internet Standards / Internet protocols / Cross-platform software / Nmap / OpenSSH / Hping / Telnet / Comparison of SSH clients / File Transfer Protocol / Transmission Control Protocol

    Fotis Hantzis Website Email sock-raw.org

    Add to Reading List

    Source URL: sock-raw.org

    Language: English - Date: 2015-10-18 14:42:59
    136Computer network security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol / AuthIP

    Microsoft PowerPoint - LinuxTag2009_Flyer_VPN_Solution.ppt [Compatibility Mode]

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2009-06-21 15:09:29
    137

    TKK Dissertations in Information and Computer Science Espoo 2008 TKK-ICS-D2 CRYPTOGRAPHIC PROTOCOL DESIGN

    Add to Reading List

    Source URL: lepo.it.da.ut.ee

    Language: English - Date: 2009-02-03 14:24:20
      138Public-key cryptography / Computer security / DolevYao model / DiffieHellman key exchange / Cryptographic protocol / RSA / Exponentiation / DiffieHellman problem / Modular exponentiation

      1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

      Add to Reading List

      Source URL: www.qatar.cmu.edu

      Language: English - Date: 2004-12-05 23:21:27
      139Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / Cipher suite

      1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

      Add to Reading List

      Source URL: prosecco.gforge.inria.fr

      Language: English - Date: 2014-02-27 10:40:02
      140Cryptography / FIPS 201 / Standards / Smart cards / Computer access control / ISO standards / Ubiquitous computing / ISO/IEC / Authentication / PIV / Cryptographic protocol / Public-key cryptography

      ITL Bulletin: Improved Security and Mobility Through Updated Interfaces for PIV Cards (July 2015)

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-07-21 08:41:09
      UPDATE