Cryptographic protocol

Results: 1374



#Item
261Data / Wireless networking / IEEE 802.1X / Internet protocols / Extensible Authentication Protocol / Cryptographic protocols / RADIUS / Authenticator / Supplicant / Computing / Computer network security / Computer security

Chapter 2, Port-Based Authentication Concepts Author: Jim Geier Principal Consultant, Wireless-Nets, Ltd. Email: This chapter is a sample from the book

Add to Reading List

Source URL: www.wireless-nets.com

Language: English - Date: 2013-06-12 20:30:23
262Computer security / Password / SPEKE / Salt / Key-agreement protocol / Replay attack / Password-authenticated key agreement / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Security

Authentication and Key Agreement via Memorable Password Taekyoung Kwon Abstract them, the knowledge-based scheme is aimed for

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:20:35
263Data / Network architecture / Tunneling protocols / Internet privacy / IPsec / Virtual private network / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Computer network security

TheGreenBow IPSec VPN Client Software

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2010-04-20 23:21:17
264Mathematics / Prime-counting function / Cryptographic nonce / Π-calculus / Data / Cyberwarfare / Otway–Rees protocol / Cryptographic protocols / Cryptography / Reflection attack

Compositional Analysis of Authentication Protocols ? Michele Bugliesi, Riccardo Focardi, and Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy {mi

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:44:01
265Computing / Cryptographic hash function / Information / Hash tree / Transmission Control Protocol / Data / Hash function / IP traceback / Error detection and correction / Hashing / Cryptography

Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks∗ Sangwon Hyun, Peng Ning, An Liu North Carolina State University Abstract

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:10
266Cryptography / Network architecture / Datagram Transport Layer Security / Transport Layer Security / Datagram Congestion Control Protocol / IPsec / Transmission Control Protocol / Cipher suite / Certificate server / Internet protocols / Computing / Cryptographic protocols

The Design and Implementation of Datagram TLS Nagendra Modadugu Stanford University Abstract A number of applications have emerged over recent

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:20
267Inter-process communication / Fault-tolerant computer systems / Internet protocols / Virtual synchrony / Network protocols / Cryptographic protocols / Reliability / Communications protocol / Public-key cryptography / Computing / Data / Information

Exploring Robustness in Group Key Agreement Yair Amir  Yongdae Kim

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:34
268Cryptography / Technology / Cryptographic protocols / IEEE 802.11 / Extensible Authentication Protocol / Wired Equivalent Privacy / Password authentication protocol / Wireless access point / Integrated Windows Authentication / Wireless networking / Computer network security / Computing

YourWireless Network has No Clothes∗ William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2001-08-11 18:26:34
269Internet standards / FTP clients / Internet protocols / FTP / Cryptographic protocols / FTPS / File Transfer Protocol / Secure Shell / Comparison of FTP client software / Computing / Internet / Network architecture

TurboFTP Your Ultimate File Transfer Tool TurboSoft develops secure file transfer client and server products which offer manageable, scalable, automated file transfer solution solution. Share information across the Inter

Add to Reading List

Source URL: www.tbsoftinc.com

Language: English - Date: 2009-08-07 00:06:13
270Cryptographic protocols / Public-key cryptography / Key management / PKI Resource Query Protocol / Online Certificate Status Protocol / SCVP / Public key infrastructure / Dynamic Host Configuration Protocol / X.509 / Cryptography / Internet protocols / Internet standards

AutoPKI: a PKI Resources Discovery System? Massimiliano Pala and Sean W. Smith Dartmouth College, Computer Science Department, 6211 Sudikoff, Hanover, NH 03755, US {pala,sws}@cs.dartmouth.edu http://www.cs.dartmouth.edu

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2007-04-29 13:13:22
UPDATE