Cryptographic protocol

Results: 1374



#Item
161Cryptography / Key management / Shared secret / Cryptographic protocol / Challengeresponse authentication / Key-agreement protocol

Secure Protocol Composition Anupam Datta John C. Mitchell Ante Derek Dusko Pavlovic

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:11
162Transport Layer Security / Cryptographic protocols / Cryptographic software / Secure communication / Internet security / OpenSSL / Heartbleed / Comparison of TLS implementations / Mbed TLS / Cipher suite / HTTPS / POODLE

Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementation David Kaloper-Merˇsinjak† , Hannes Mehnert† , Anil Madhavapeddy and Peter Sewell University of Cambridge Comput

Add to Reading List

Source URL: anil.recoil.org

Language: English - Date: 2015-07-05 12:54:07
163Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:36:15
164Cryptography / Electric power / Secure multi-party computation / Public-key cryptography / Electricity meter / Smart meter / Smart grid / Cryptographic protocol / Privacy / Communications protocol / Zero-knowledge proof

Smart Meter Aggregation via Secret-Sharing George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin Microsoft Research, Cambridge, UK {gdane,fournet,markulf,santiago}@microsoft.com

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-11-04 03:36:30
165Cryptography / Public-key cryptography / Ciphertext indistinguishability / DolevYao model / Cryptographic protocol / Digital signature / Protocol composition logic / Cryptographic primitive / XTR / Commitment scheme / Index of cryptography articles

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:13
166Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic protocol

PDF Document

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:38:38
167Cryptographic protocols / Internet Standards / Internet protocols / Cryptographic software / Secure communication / Transport Layer Security / GnuTLS / OpenSSL / Cipher suite / Electronic authentication / Online Certificate Status Protocol / X.509

PDF Document

Add to Reading List

Source URL: gnutls.org

Language: English - Date: 2016-02-03 03:28:21
168Cryptography / Cryptographic protocols / Transport Layer Security / Public-key cryptography / Wireless / Secure communication / Man-in-the-middle attack / Bluetooth / Key-agreement protocol / HTTPS / Password / Transmission Control Protocol

PDF Document

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
169Cryptography / Public-key cryptography / Protocol composition logic / Automated theorem proving / Cryptographic protocols / Substitution / Digital signature / Communications protocol / Transport Layer Security

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:12
170Email / Cryptographic protocols / Internet protocols / Protocols / Internet standards / IPsec / Cell Broadcast / Transmission Control Protocol / European Telecommunications Standards Institute / Computing / Data / Information

TSV1Satellite Earth Stations and Systems (SES); Satellite Emergency Communications; Multiple Alert Message Encapsulation over Satellite (MAMES)

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-05-12 09:42:04
UPDATE