Cryptographic protocol

Results: 1374



#Item
21Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2)  Definition of zero-knowledge (ZK)

Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2) Definition of zero-knowledge (ZK)

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-03-06 05:37:28
22Server-driven Outbound Web-application Sandboxing  FP7-ICT, Project Nohttps://www.websand.eu  Deliverable D1.1

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D1.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:48
23Experiment Proposal Template

Experiment Proposal Template

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2011-05-13 21:34:51
24LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-05 11:52:34
25Server-driven Outbound Web-application Sandboxing  FP7-ICT, Project Nohttps://www.websand.eu  Deliverable D2.1

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:49
26PLACES’10  The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

Add to Reading List

Source URL: places10.di.fc.ul.pt

Language: English - Date: 2010-12-07 19:00:11
27How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2016-05-24 15:16:00
28Computing / Cryptography / Wireless networking / Computer security / Cryptographic protocols / IEEE 802.11u / Computer network security / Extensible Authentication Protocol / IEEE 802.11 / Authentication

November 2007 doc.: IEEE2786r0 IEEE P802.11 Wireless LANs Liaison from IETF EMU to IEEEDate:

Add to Reading List

Source URL: mentor.ieee.org

Language: English - Date: 2011-06-28 18:39:10
29Sustainable Shorelines Advisory Committee Meeting  January 20, 10:00 am - 3:30 pm NYSDEC Hudson River National Estuarine Research Reserve Norrie Point Environmental Center Staatsburg, NYMEETING SUMMARY

Sustainable Shorelines Advisory Committee Meeting January 20, 10:00 am - 3:30 pm NYSDEC Hudson River National Estuarine Research Reserve Norrie Point Environmental Center Staatsburg, NYMEETING SUMMARY

Add to Reading List

Source URL: www.hrnerr.org

Language: English - Date: 2016-03-31 13:58:13
30KEK GRID CA  Service Certificate Policy and Certificate Practices Statements  Ver

KEK GRID CA Service Certificate Policy and Certificate Practices Statements Ver

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2016-05-25 03:17:16