Cryptographic protocol

Results: 1374



#Item
211Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-01-13 10:28:23
212Cryptographic protocols / Portable software / FTP / Internet protocols / Health informatics / SSH File Transfer Protocol / FileZilla / File Transfer Protocol / Health Level 7 / Software / Computing / Network architecture

Meaningful Use Stage 2 (MU2) CCR Cancer Data Transmission Options Secure FTP Transmission 1. Request access to the Secure File Transfer Protocol (SFTP) service by sending a request to - with subject

Add to Reading List

Source URL: hie.cdph.ca.gov

Language: English - Date: 2015-01-29 18:01:01
213Internet privacy / Secure communication / Public-key cryptography / Secure Real-time Transport Protocol / Encryption / Shared secret / Key / Skype security / Index of cryptography articles / Cryptography / Key management / Cryptographic protocols

Secure Calls & Messages Best practice cryptography Peer-to-peer communication Maximum security Superior voice quality

Add to Reading List

Source URL: www.crypttalk.com

Language: English - Date: 2015-02-20 10:27:12
214Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2012-01-15 19:52:05
215Network architecture / Internet standards / URI schemes / Cryptographic protocols / Secure communication / HTTP pipelining / Transmission Control Protocol / Hypertext Transfer Protocol / HTTP Secure / Computing / Internet / HTTP

http2 explained Background, the protocol, the implementations and the future http://daniel.haxx.se/http2/ by Daniel Stenberg

Add to Reading List

Source URL: daniel.haxx.se

Language: English - Date: 2015-05-21 04:06:53
216Key management / Electronic commerce / Verifiable secret sharing / Key distribution / Interactive proof system / Diffie–Hellman key exchange / Authentication / Secret sharing / Computer network / Cryptography / Cryptographic protocols / Public-key cryptography

Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks Hitoshi Asaeda∗ , Musfiq Rahman† , Mohammad Hossein Manshaei‡ , Yasuko Fukuzawa§ University, Graduate School of Media and Governance

Add to Reading List

Source URL: web.sfc.wide.ad.jp

Language: English - Date: 2006-01-24 03:14:56
217Network architecture / Real Estate Transaction Standard / HTTP / Cryptographic protocols / World Wide Web / Hypertext Transfer Protocol / Digest access authentication / Representational state transfer / Session / Computing / Network protocols / Real estate

RETS Certification System RETSand 1.8 Testing Rules Version: 02 June 2014 RETS Compliance & Certification

Add to Reading List

Source URL: www.reso.org

Language: English - Date: 2014-06-19 14:06:06
218Computing / Internet / Network architecture / Transport Layer Security / Cipher suite / Telex / Proxy server / Transmission Control Protocol / HTTP Secure / Cryptographic protocols / Secure communication / Internet protocols

Telex: Anticensorship in the Network Infrastructure Eric Wustrow∗ ∗ The Scott Wolchok∗

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-07-18 09:40:53
219Technology / Energy service company / Measurement and Verification / Cryptographic Module Validation Program / Entertainment Services and Technology Association / Verification / Energy Savings Performance Contract / Force / Knowledge / Energy conservation / Certified measurement and verification professional / International performance measurement and verification protocol

CMVP ® training and examination

Add to Reading List

Source URL: www.esta.org.uk

Language: English - Date: 2014-06-24 04:07:51
220Wi-Fi Protected Setup / Wireless networking / Technology / Telecommunications engineering / Extensible Authentication Protocol / IEEE 802.11 / Authenticator / HostAP / Supplicant / Wi-Fi / Cryptographic protocols / Computing

Brute forcing Wi-Fi Protected Setup When poor design meets poor implementationVersion 3

Add to Reading List

Source URL: sviehb.files.wordpress.com

Language: English - Date: 2011-12-27 05:58:32
UPDATE