Cryptographic protocol

Results: 1374



#Item
271Cyberwarfare / Cryptographic protocols / Computer security / Kerberos / Key distribution center / Needham–Schroeder protocol / Key / Cryptographic nonce / Woo–Lam / Cryptography / Computer network security / Key management

Lecture 10: Key Distribution for Symmetric Key Cryptography and Generating Random Numbers Lecture Notes on “Computer and Network Security” by Avi Kak () February 17, :26am

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-17 00:27:22
272Zero-knowledge proof / Adversary model / Advantage / IP / Public-key cryptography / Communications protocol / Malleability / Cryptography / Cryptographic protocols / Commitment scheme

Constant-Round Coin-Tossing With a Man in the Middle or Realizing the Shared Random String Model Boaz Barak∗ May 19, 2008

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:33
273Internet privacy / Network architecture / Cryptographic software / Transmission Control Protocol / Packet switching / Packet Processing / Internet Protocol / Anonymity / Degree of anonymity / Computing / Computer networking / Internet

LAP: Lightweight Anonymity and Privacy Hsu-Chun Hsiao† Tiffany Hyun-Jin Kim† Adrian Perrig† Akira Yamada‡ §

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-04-13 16:45:42
274Tunneling protocols / IPv6 / Cryptographic protocols / IPsec / IPv6 deployment / IPv6 transition mechanisms / Internet Protocol / Network architecture / Data

IPv6 Ready Logo Phase II Test Specification IPsec Technical Document Revision 1.8.0b2

Add to Reading List

Source URL: www.ipv6.ru

Language: English - Date: 2007-02-02 17:53:24
275Cryptographic protocols / Networking hardware / Electronic engineering / Wi-Fi / Computer network security / Point-to-point protocol over Ethernet / Wireless LAN / IEEE 802.11 / Router / Computing / Wireless networking / Technology

Belkin Surf N300 Wireless N Modem Router ADSL 2.4GHz 300Mbps • • •

Add to Reading List

Source URL: www.corintech.com.hk

Language: English - Date: 2013-10-03 04:31:12
276Computer network security / Data / Internet protocols / Tunneling protocols / Internet standards / IPsec / Internet Key Exchange / Internet Security Association and Key Management Protocol / RADIUS / Computing / Cryptographic protocols / Network architecture

Trust Management for IPsec Matt Blaze AT&T Labs - Research John Ioannidis AT&T Labs - Research

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:19:57
277Cryptography / Communications protocol / Cryptographic primitive / Dines Bjørner / Computing / Data / Information / Cryptographic protocols

T (+ u (+ B Í http://www.lsv.ens-cachan.fr/~delaune/ Stéphanie Delaune

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2014-10-01 04:59:16
278Internet protocols / Cryptographic protocols / Internet standards / PKI Resource Query Protocol / Public key infrastructure / X.509 / Revocation list / Certificate authority / Certificate policy / Cryptography / Public-key cryptography / Key management

Extending PKI Interoperability in Computational Grids Massimiliano Pala∗ , Shreyas Cholia† , Scott A. Rea∗ , Sean W. Smith∗ ∗ †

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English
279Network architecture / Network performance / Cryptographic software / Tor / Onion routing / Network congestion / Proxy server / Denial-of-service attack / Transmission Control Protocol / Internet privacy / Computing / Internet

A Practical Congestion Attack on Tor Using Long Paths Nathan S. Evans Colorado Research Institute for Security and Privacy University of Denver Email:

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2009-06-11 20:30:09
280Security / Secure communication / Data / HTTP Secure / Hypertext Transfer Protocol / Session / World Wide Web / Two-factor authentication / Cross-site request forgery / Computing / HTTP / Cryptographic protocols

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.3

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2014-05-11 17:31:12
UPDATE