Cryptographic protocol

Results: 1374



#Item
11Cryptographic protocol / Communications protocol / OSI protocols / Network architecture

JU_RECTOR_PANTONE_POSITIVE

Add to Reading List

Source URL: www.aquaexcel.eu

Language: English - Date: 2016-04-29 11:12:30
12Computing / Network architecture / Internet / Smart cards / Internet protocols / Internet Standards / Cryptographic protocols / Network protocols / Subscriber identity module / Universal Integrated Circuit Card / Transport Layer Security / Hypertext Transfer Protocol

SCWS_SteppingStones_2009_v1.0.0

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2015-03-26 18:46:30
13Transmission Control Protocol / Cryptographic nonce / Checksum

Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger Michael K. Reiter

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
14Computing / OSI protocols / Network architecture / Data transmission / Communications protocol / Network protocols / Cryptographic protocol / Internet protocol suite / OSI model / Transport layer / Datagram / ProVerif

Developing teaching material for formal modeling of security protocols Daming Chen and Michael Huth Overview •

Add to Reading List

Source URL: www.dcddcc.com

Language: English - Date: 2016-08-05 04:38:12
15Computing / Cryptography / Network architecture / Transport Layer Security / Hypertext Transfer Protocol / Internet privacy / Internet protocols / Cryptographic protocols / Proxy server / HTTPS / Apache HTTP Server / Certificate authority

The TCPProxy Table of contents 1 Starting the TCPProxy..................................................................................................2 2 Preparing the Browser...........................................

Add to Reading List

Source URL: grinder.sourceforge.net

Language: English - Date: 2014-05-20 07:02:06
16Security / Cryptography / Computing / Formal sciences / Theoretical computer science / Secure multi-party computation / Cryptographic protocol / Mobile agent / Algorithm / Transmission Control Protocol / Computer security

Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2004-07-28 23:00:33
17Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2015-12-16 04:48:58
18Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange

Item Title Consolidated iTC Feedback – DNcPPv2 SD Reviewer iTC Editorial Team Item Identifier NDcPPv2 Supporting Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 09:29:08
19Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-23 04:37:54
20Computing / Network architecture / Cryptographic protocols / Computer network security / Cryptography / Tunneling protocols / Virtual private networks / Internet protocols / IPsec / Internet Key Exchange / Layer 2 Tunneling Protocol / NAT traversal

Secure Business Connectivity HOBLink VPN 2.1 Gateway The VPN Solution for More Security and Greater Flexibility Edition 10|13

Add to Reading List

Source URL: www.hobsoft.com

Language: English - Date: 2014-01-10 07:06:54
UPDATE