Cryptographic protocol

Results: 1374



#Item
281Cryptography / Quantum complexity theory / PP / Secure multi-party computation / Secure two-party computation / Verifiable secret sharing / Function / Transmission Control Protocol / Cryptographic protocols / Mathematics / Applied mathematics

Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay Jonathan Katz

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2008-07-05 10:54:06
282Email / Electronic documents / Man-in-the-middle attack / Trusted third party / Alice and Bob / Simple Mail Transfer Protocol / Digital signature / Needham–Schroeder protocol / Cryptography / Public-key cryptography / Cryptographic protocols

TRICERT: A Distributed Certified E-Mail Scheme Giuseppe Ateniese Breno de Medeiros Michael T. Goodrich

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:08:05
283Public key infrastructure / X.509 / Revocation list / Public key certificate / Certificate authority / Digital signature / Online Certificate Status Protocol / Smart grid / Certificate policy / Cryptography / Public-key cryptography / Key management

1 Cryptographic Scalability Challenges in the Smart Grid (Extended Abstract) Sean W. Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2012-04-18 14:18:48
284Computing / Computer network security / Cryptographic protocols / Internet protocols / Authenticator / HTTP cookie / Digest access authentication / Password authentication protocol / Kerberos / HTTP / Computer security / Security

Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster fubob, sit, kendras, feamster @mit.edu  MIT Laboratory for Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:14
285Technology / Wireless / Computer network security / IEEE 802.11 / Wi-Fi / Wireless security / Extensible Authentication Protocol / IEEE 802.11i-2004 / Wi-Fi Protected Access / Wireless networking / Cryptographic protocols / Cryptography

Cisco − Wi−Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi−Fi Protected Access 2 (WPA 2) Configuration Example..........................................................................1 Do

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:29:05
286Technology / Wireless / Cryptographic protocols / IEEE 802.11 / Wi-Fi / Extensible Authentication Protocol / Wireless security / Wi-Fi Protected Access / Wpa supplicant / Wireless networking / Computer network security / Computing

Cisco − WPA Configuration Overview Table of Contents WPA Configuration Overview...........................................................................................................................1 To get Cisco

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:29:06
287Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Proxy server / HTTP Secure / Secure Shell / Cryptographic protocols / Computing / Secure communication

Performance Analysis of TLS Web Servers Cristian Coarfa, Peter Druschel and Dan S. Wallach Department of Computer Science Rice University Abstract TLS is the protocol of choice for securing today’s ecommerce and online

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:16:24
288Computer network security / Data / Internet protocols / Cryptographic protocols / Virtual private networks / IPsec / Layer 2 Tunneling Protocol / NAT-T / Point-to-Point Tunneling Protocol / Tunneling protocols / Computing / Network architecture

TheGreenBow IPSec VPN Client Configuration Guide 3COM X-FAMILY WebSite:

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2007-09-27 05:39:01
289Computing / Communications protocol / Secure two-party computation / X Window System / Universal composability / Cryptographic protocols / Data / Information

Universally Composable Security: A New Paradigm for Cryptographic Protocols∗ Ran Canetti† July 16, 2013 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-16 22:00:04
290Directory services / Internet protocols / Cryptographic protocols / X.500 / Revocation list / X.509 / Lightweight Directory Access Protocol / Public key infrastructure / Public key certificate / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: www.viewds.com

Language: English - Date: 2015-03-12 00:59:26
UPDATE