Cryptographic protocol

Results: 1374



#Item
11JU_RECTOR_PANTONE_POSITIVE

JU_RECTOR_PANTONE_POSITIVE

Add to Reading List

Source URL: www.aquaexcel.eu

Language: English - Date: 2016-04-29 11:12:30
12SCWS_SteppingStones_2009_v1.0.0

SCWS_SteppingStones_2009_v1.0.0

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2015-03-26 18:46:30
13Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger  Michael K. Reiter

Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger Michael K. Reiter

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
14Developing teaching material for formal modeling of security protocols Daming Chen and Michael Huth Overview •

Developing teaching material for formal modeling of security protocols Daming Chen and Michael Huth Overview •

Add to Reading List

Source URL: www.dcddcc.com

Language: English - Date: 2016-08-05 04:38:12
15The TCPProxy Table of contents 1 Starting the TCPProxy..................................................................................................2 2 Preparing the Browser...........................................

The TCPProxy Table of contents 1 Starting the TCPProxy..................................................................................................2 2 Preparing the Browser...........................................

Add to Reading List

Source URL: grinder.sourceforge.net

Language: English - Date: 2014-05-20 07:02:06
16Abstract  Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2004-07-28 23:00:33
17Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2015-12-16 04:48:58
18Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange

Item Title Consolidated iTC Feedback – DNcPPv2 SD Reviewer iTC Editorial Team Item Identifier NDcPPv2 Supporting Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 09:29:08
19Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-23 04:37:54
20Secure Business Connectivity  HOBLink VPN 2.1 Gateway The VPN Solution for More Security and Greater Flexibility  Edition 10|13

Secure Business Connectivity HOBLink VPN 2.1 Gateway The VPN Solution for More Security and Greater Flexibility Edition 10|13

Add to Reading List

Source URL: www.hobsoft.com

Language: English - Date: 2014-01-10 07:06:54