Cryptographic protocol

Results: 1374



#Item
151

Unpicking PLAID A Cryptographic Analysis of an ISO-standardstrack Authentication Protocol SSR 2014, RHUL, United Kingdom Jean Paul Degabriele Kenneth G. Paterson

Add to Reading List

Source URL: ssr2015.com

Language: English - Date: 2015-06-22 06:35:00
    152Cryptography / Computing / Software / Cryptographic software / Internet protocols / OpenSSL / Cryptographic protocols / Internet Standards / Secure communication / Transport Layer Security / Apache HTTP Server / Application-Layer Protocol Negotiation

    The State of TLS in httpd 2.4 William A. Rowe Jr. Getting Started ●

    Add to Reading List

    Source URL: events.linuxfoundation.org

    Language: English - Date: 2015-10-02 08:34:41
    153Public-key cryptography / E-commerce / Key management / Public key infrastructure / Secure communication / Cryptographic primitive / ID-based encryption / Cryptography / Cryptographic protocol / Zero-knowledge proof / Public key certificate / Digital signature

    ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

    Add to Reading List

    Source URL: esorics2015.sba-research.org

    Language: English - Date: 2015-09-22 04:03:47
    154Internet privacy / Secure communication / Computer networking / Cryptographic protocols / Transport Layer Security / Proxy server / Transmission Control Protocol / HTTPS / Internet protocol suite / Session Initiation Protocol

    Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

    Add to Reading List

    Source URL: irtf.org

    Language: English - Date: 2016-01-05 05:04:04
    155Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

    Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:38:44
    156Cryptographic protocols / Secure communication / Internet protocols / Transport Layer Security / Network protocols / Transmission Control Protocol / HTTPS / Ciphertext indistinguishability / Initialization vector / Hypertext Transfer Protocol / Block cipher mode of operation / Keystream

    This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

    Add to Reading List

    Source URL: jhalderm.com

    Language: English - Date: 2015-11-02 11:01:00
    157Cryptography / Cryptographic protocols / Public-key cryptography / Internet protocols / DiffieHellman key exchange / NeedhamSchroeder protocol / Communications protocol / Key exchange / Protocol composition logic / Interlock protocol

    Journal of Computer Security–482 IOS Press 423 A derivation system and compositional logic

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:12
    158Cryptography / Protocol composition logic / Authentication protocols / BurrowsAbadiNeedham logic / Communications protocol / Kerberos / Public-key cryptography / Cryptographic protocol

    A. Datta et al. / Protocol Composition Logic 1 Protocol Composition Logic Anupam DATTA a , John C. MITCHELL b , Arnab ROY b and

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:08
    159Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

    Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:15
    UPDATE