Cryptographic protocol

Results: 1374



#Item
171TCP/IP / Electronic commerce / Key management / Tcpcrypt / Transmission Control Protocol / Public key certificate / Transport Layer Security / Cryptography / Public-key cryptography / Cryptographic protocols

Introduction tcpcrypt Performance Conclusion 1/25

Add to Reading List

Source URL: www.tcpcrypt.org

Language: English - Date: 2010-08-13 12:07:58
172Secure multi-party computation / Secure two-party computation / IP / Oblivious transfer / PP / Communications protocol / Communication complexity / RSA / Security parameter / Cryptography / Theoretical computer science / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-07-21 08:57:56
173OSI protocols / Routing / Wireless ad-hoc network / Packet forwarding / Link-state routing protocol / Dynamic Source Routing / Wireless networking / Network architecture / Technology

On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks ∗ — An Integrated Approach Using Game Theoretic and Cryptographic Techniques 1

Add to Reading List

Source URL: www-net.cs.yale.edu

Language: English - Date: 2006-05-11 18:31:30
174Payment systems / Digital technology / Electronic money / Financial cryptography / Hypertext Transfer Protocol / Error message / Web standards / Technology / Computing / Cryptographic protocols / Electronic commerce

CaVirtex HTTP API Documentation Table of Contents Authentication Parameters......................................................................................... 1 HTTP Post : .........................................

Add to Reading List

Source URL: www.cavirtex.com

Language: English - Date: 2014-10-02 19:03:57
175Key-agreement protocol / Received signal strength indication / Information theory / Cryptographic protocols / Information / Data

On the Possibility of Key Agreement Using Variable Directional Antenna Hideki Imai12 , Kazukuni Kobara21 , and Kirill Morozov21 1 2

Add to Reading List

Source URL: imi.kyushu-u.ac.jp

Language: English - Date: 2007-02-07 16:57:52
176HTTP / Cryptographic protocols / Internet standards / Secure communication / Email / MIME / Hypertext Transfer Protocol / HTTP Secure / Communications protocol / Computing / Data / Information

THE MITRE CORPORATION The TAXII HTTP Protocol Binding Specification Version 1.0 Mark Davidson, Charles Schmidt

Add to Reading List

Source URL: taxii.mitre.org

Language: English - Date: 2013-04-30 13:13:27
177Data / Network architecture / Tunneling protocols / Internet protocols / Internet Key Exchange / Virtual private networks / IPsec / Check Point / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Computer network security

Chapter 5 Advanced VPN Concepts and Tunnel Monitoring Solutions in this chapter:

Add to Reading List

Source URL: scitechconnect.elsevier.com

Language: English - Date: 2015-03-19 08:13:14
178RSA / ElGamal encryption / Diffie–Hellman key exchange / Homomorphic encryption / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptography / Public-key cryptography / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2013-02-05 01:02:43
179Cryptography / Distance-bounding protocol / IP / NP / Alice and Bob / Formal verification / Challenge-response authentication / The Verifier / Transmission Control Protocol / Theoretical computer science / Cryptographic protocols / Applied mathematics

Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:49
180Digital signature / RSA / Random oracle / Commitment scheme / Cryptographic protocol / Model theory / XTR / Cryptography / Public-key cryptography / Blind signature

Concurrently-Secure Blind Signatures without Random Oracles or Setup Assumptions? Carmit Hazay1 , Jonathan Katz2 , Chiu-Yuen Koo2 , and Yehuda Lindell1 1 Bar-Ilan University.

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 08:30:47
UPDATE