Cryptographic protocol

Results: 1374



#Item
221Portable software / FTP clients / Cryptographic software / FTP / Data synchronization / WinSCP / File Transfer Protocol / FileZilla / Password / Software / Computing / OSI protocols

SECURE FTP INFORMATION SHEET Step 1 – Download Software Download the WinSCP software at the below site. Visit the following URL http://winscp.net/eng/download.php

Add to Reading List

Source URL: firstmap.gis.delaware.gov

Language: English - Date: 2015-05-13 15:39:58
222A10 Networks / Denial-of-service attack / HTTP Secure / Computing / Transmission Control Protocol / Cyberwarfare / Security / Load balancing / Computer network security / Cryptographic protocols / Secure communication

4 REASONS you need a HIGH PERFORMANCE ADC

Add to Reading List

Source URL: www.a10networks.com

Language: English - Date: 2015-03-10 18:51:23
223Security token / Keychain / Authentication protocol / Applied Cryptography and Network Security / AKA / Cryptography / Cryptographic protocols / MIFARE

PDF Document

Add to Reading List

Source URL: icsd.i2r.a-star.edu.sg

Language: English - Date: 2012-06-13 22:48:00
224Cryptographic software / Internet protocols / Internet standards / Secure Shell / OpenSSH / Telnet / Rlogin / File Transfer Protocol / SSH Communications Security / System software / Software / Computing

Risks of Unmanaged Encrypted Environments  to Critical National Infrastructures Tatu Ylönen Founder and CEO SSH Communications Security

Add to Reading List

Source URL: www.jnsa.org

Language: English - Date: 2014-02-04 01:44:37
225Computer security / Computer network security / Authentication protocol / Authentication / Kerberos / Cryptography / Cryptographic protocols / Security

Demarcation of Security in Entity Authentication Protocols Naveed Ahmed & Christian D. Jensen DTU Informatics, Denmark July 6, 2011

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:29:53
226Error detection and correction / Search algorithms / Data synchronization / Rsync / Cryptographic hash functions / Hashing / Transmission Control Protocol / Checksum / Sum / Computing / Data / System software

Int. J. Communications, Network and System Sciences, 2013, 6, 37-51 doi:ijcnsPublished Online Januaryhttp://www.scirp.org/journal/ijcns) Scalable Incremental Network Programming for Multihop Wi

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-02-07 00:17:36
227Cryptographic protocols / Internet / Data / Secure communication / Transport Layer Security / Cipher suite / Lightweight Directory Access Protocol / FTPS / Extensible Authentication Protocol / Computing / Internet standards / Internet protocols

Advanced Client/Server Authentication in TLS Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith Computer Science Department Brigham Young University Provo, Utah, USA 84602

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-26 10:17:06
228Internet protocols / Internet standards / Online Certificate Status Protocol / Revocation list / X.509 / Lightweight Directory Access Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

Using Dirmngr for version 1.0.2, 31 July 2008 Steffen Hansen () Werner Koch ()

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2008-07-31 08:03:50
229Cryptographic protocols / Internet protocols / Authorization certificate / Revocation list / Public key certificate / X.509 / Privilege Management Infrastructure / Online Certificate Status Protocol / NP / Cryptography / Public-key cryptography / Key management

PAMINA: A Certificate Based Privilege Management System Zoltán Nochta, Peter Ebinger and Sebastian Abeck University of Karlsruhe, Institute for Telematics, Cooperation and Management IT-Research Group Zirkel 2, 76128 Ka

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:36:07
230Public-key cryptography / Diffie–Hellman key exchange / Key-agreement protocol / Key management / Virtual synchrony / XTR / Key exchange / Secure channel / SPEKE / Cryptographic protocols / Information / Computing

On the Performance of Group Key Agreement Protocols  Yair Amir 

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
UPDATE