Cryptographic protocol

Results: 1374



#Item
181Cryptography / Mathematics / Secure multi-party computation / Function / Communications protocol / Security parameter / Cryptographic primitive / Secure two-party computation / Cryptographic protocols / Data / Information

Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2015-07-03 05:13:02
182Security / Dolev-Yao model / Authentication protocol / Cryptography / Cryptographic nonce / Communications protocol / Authentication / Π-calculus / Cryptographic protocols / Data / Information

ACI ROSSIGNOL Denis LUGIEZ www.cmi.univ-mrs.fr/ lugiez/aci-rossignol.html 

Add to Reading List

Source URL: www.irisa.fr

Language: English - Date: 2003-12-17 02:53:50
183Computing / Communications protocol / Yahalom / Needham–Schroeder protocol / Cryptographic protocols / Data / Information

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-10-17 10:40:00
184Java platform / Formal methods / Logic in computer science / Formal verification / Cryptographic primitive / KeY / Cryptography / Java Card / Cryptographic protocol / Computing / Theoretical computer science / Formal sciences

Poster: Security in E-Voting Daniel Bruns† , Huy Quoc Do‡ , Simon Greiner† , Mihai Herda† , Martin Mohr† , Enrico Scapin∗ , Tomasz Truderung∗ , Bernhard Beckert† , Ralf Küsters∗ , Heiko Mantel‡ and R

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:19
185

Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

Add to Reading List

Source URL: jeapostrophe.github.io

- Date: 2015-05-11 20:44:55
    186

    BRICS Basic Research in Computer Science BRICS DS-03-8 J. B. Nielsen: On Protocol Security in the Cryptographic Model

    Add to Reading List

    Source URL: www.brics.dk

    - Date: 2004-03-22 12:21:42
      187

      A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP Iftach Haitner Mohammad Mahmoody

      Add to Reading List

      Source URL: www.cs.tau.ac.il

      Language: English - Date: 2013-06-11 04:13:24
        188Computer network security / Data / Internet protocols / Tunneling protocols / Internet standards / IPsec / Internet Key Exchange / Internet Security Association and Key Management Protocol / RADIUS / Computing / Cryptographic protocols / Network architecture

        Trust Management for IPsec Matt Blaze AT&T Labs - Research John Ioannidis AT&T Labs - Research

        Add to Reading List

        Source URL: crypto.com

        Language: English - Date: 2001-03-05 21:44:56
        189Cryptographic protocol / ASP.NET / Cryptographic hash function / Symmetric-key algorithm / Computer security / Key / Cryptography / Security / Cryptographic primitive

        SECURITY DRIVEN .NET .NET/ASP.NET 4.5 STAN DRAPKIN. OCTOBER 2013. SECURITY DRIVEN .NET

        Add to Reading List

        Source URL: securitydriven.net

        Language: English - Date: 2015-04-04 22:36:18
        190Internet / Cryptographic software / Transmission Control Protocol / Packet switching / Internet Protocol / Packet Processing / Anonymity / Degree of anonymity / Tor / Computer networking / Computing / Internet privacy

        LAP: Lightweight Anonymity and Privacy

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2012-05-22 01:35:47
        UPDATE