Cryptographic protocol

Results: 1374



#Item
251Internet standards / Internet protocols / Email / HTTP / Cryptographic protocols / Hypertext Transfer Protocol / Transport Layer Security / URI scheme / Representational state transfer / Computing / Internet / Network architecture

Internet Engineering Task Force (IETF) Request for Comments: 7230 Obsoletes: 2145, 2616 Updates: 2817, 2818 Category: Standards Track ISSN:

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-06-06 21:14:27
252Secure communication / Electronic commerce / Learning with errors / NTRU / Transport Layer Security / Cipher suite / Elliptic curve cryptography / Quantum computer / RSA / Cryptography / Cryptographic protocols / Internet protocols

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:27:47
253Information / Cryptographic protocols / Free software / ProVerif / Ciphertext indistinguishability / Communications protocol / Cryptographic primitive / Authentication / Tor / Cryptography / Cryptographic software / Data

Verification of security protocols — reducing the number of agents — Laboratory, institution and university LSV, ENS Cachan and LORIA, Nancy universités The internship will be located at Nancy and/or at ENS Cachan d

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2014-10-21 15:33:34
254Technology / Ubiquitous computing / Wireless / Surveillance / Authentication protocol / Cryptographic nonce / Automatic identification and data capture / Radio-frequency identification / Human–computer interaction

1 Securing Low-cost RFID Systems: an Unconditionally Secure Approach Basel Alomair a , Loukas Lazos b , and Radha Poovendran a a

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-04-26 12:59:27
255Directory services / Internet protocols / Cryptographic protocols / X.500 / Revocation list / X.509 / Lightweight Directory Access Protocol / Public key infrastructure / Public key certificate / Cryptography / Public-key cryptography / Key management

World Leading Discovery Technology White Paper: A Scalable and Distributed Solution

Add to Reading List

Source URL: viewds.com

Language: English - Date: 2015-03-12 00:59:26
256Cryptographic protocols / Computer network security / Internet protocols / Internet standards / Secure communication / Transport Layer Security / IPsec / OSI model / Internet protocol suite / Computing / Cryptography / Internet

Lecture 20: PGP, IPSec, SSL/TLS, and Tor Protocols Lecture Notes on “Computer and Network Security” by Avi Kak () April 23, 2015 1:35pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-23 13:36:30
257Data / Network architecture / Tunneling protocols / Internet privacy / IPsec / Internet Security Association and Key Management Protocol / Virtual private network / Cryptographic protocols / Computing / Computer network security

TheGreenBow IPSec VPN Client Configuration Guide AlliedTelesis AT-AR700 Series WebSite:

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2010-02-11 09:02:10
258Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / RSA / Otway–Rees protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Authenticity by Tagging and Typing ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Università Ca’Foscari di Venezia

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:43:38
259Spam filtering / Computer-mediated communication / Cryptographic protocols / Yahoo! / DomainKeys Identified Mail / SMTP Authentication / Simple Mail Transfer Protocol / Sender Policy Framework / Vouch by Reference / Email authentication / Email / Computing

draft-ietf-appsawg-rfc7001bis-07 - Message Header Field for Indicating Message Authentication Status

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-22 05:04:16
260Key size / Whitfield Diffie / Public-key cryptography / Key-agreement protocol / Advanced Encryption Standard / Diffie–Hellman problem / Index of cryptography articles / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:57
UPDATE