Cryptographic protocol

Results: 1374



#Item
241Computing / Burrows–Abadi–Needham logic / Cryptography / Communications protocol / Protocol / Data / Information / Cryptographic protocols

Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley∗ Department of Computer Science University College, Cork, Ireland {zhou,s.foley}@cs.ucc.ie

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2013-02-18 06:01:24
242Secure multi-party computation / Zero-knowledge proof / Standard model / IP / Random oracle / Communications protocol / Commitment scheme / NP / Transmission Control Protocol / Cryptography / Cryptographic protocols / Secure two-party computation

How To Play Almost Any Mental Game Over The Net — Concurrent Composition via Super-Polynomial Simulation Boaz Barak∗ Department of Computer Science Princeton University Princeton, New Jersey

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:49:36
243Key size / Public-key cryptography / Whitfield Diffie / Key-agreement protocol / Diffie–Hellman problem / Index of cryptography articles / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:43
244Internet protocols / Internet standards / Cryptographic software / Secure Shell / Ssh-agent / Rlogin / Telnet / File Transfer Protocol / Password / Software / Computing / System software

Intro. to discussion on Interactive sessions and password security A.J.Flavell Glasgow PPE Group UK HEP SYSMAN @ UCL, 30 Sept 1998

Add to Reading List

Source URL: hepwww.rl.ac.uk

Language: English - Date: 2007-05-14 10:18:37
245Error detection and correction / Search algorithms / Data synchronization / Rsync / Cryptographic hash functions / Hashing / Transmission Control Protocol / Checksum / Sum / Computing / Data / System software

Int. J. Communications, Network and System Sciences, 2013, 6, 37-51 doi:ijcnsPublished Online Januaryhttp://www.scirp.org/journal/ijcns) Scalable Incremental Network Programming for Multihop Wi

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-07-03 11:52:33
246Data / Transmission Control Protocol / Kerberos / Public-key cryptography / Port / Cryptography / Cryptographic protocols / Internet protocols

Security Protocol Deployment Risk Simon N. Foley1 , Giampaolo Bella2,3 , and Stefano Bistarelli4,5 1 4

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2008-09-03 07:44:42
247Computing / Burrows–Abadi–Needham logic / Cryptography / Communications protocol / Yahalom / Transmission Control Protocol / IP / Interpretation / Data / Information / Cryptographic protocols

A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:05:15
248File sharing networks / Cryptographic protocols / Secure communication / Cross-platform software / Kademlia / Peer-to-peer / Distributed hash table / Kad network / Transport Layer Security / Software / Computing / Distributed data storage

UNIVERSITY OF MANNHEIM Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia

Add to Reading List

Source URL: www.philippheckel.com

Language: English - Date: 2009-11-25 08:49:15
249Computing / Secure Shell / Ssh-keygen / OpenSSH / Secure copy / SSHFS / File Transfer Protocol / Comparison of SSH clients / Comparison of SSH servers / Software / System software / Cryptographic software

MASTERCLASS SSH AN INTRODUCTION TO SSH Get to grips with SSH and lord it over remote machines… I

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-01-08 10:21:46
250Computing / Internet protocols / Secure communication / HTTP / HTTP Secure / Port / Communications protocol / Transmission Control Protocol / ARPANET / Data / Cryptographic protocols / Information

Communication over Challenged Networks Keith Winstein Stanford University Secure Internet of Things Project Workshop Stanford University

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2014-11-10 17:36:13
UPDATE