Cryptographic protocol

Results: 1374



#Item
291IEEE P1363 / SPEKE / Secure Remote Password protocol / Encrypted key exchange / Password / PKCS / Key-agreement protocol / Key exchange / Elliptic curve cryptography / Cryptography / Cryptographic protocols / Password-authenticated key agreement

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:57
292Cryptographic protocols / Internet protocols / Open standards / Simple Authentication and Security Layer / Advanced Message Queuing Protocol / Apache Qpid / CRAM-MD5 / Password / Integrated Windows Authentication / Computing / Message-oriented middleware / Internet standards

PDF Document

Add to Reading List

Source URL: labs.mwrinfosecurity.com

Language: English - Date: 2015-05-22 06:07:51
293Internet protocols / Internet standards / Cryptographic protocols / Key derivation function / PBKDF2 / Online Certificate Status Protocol / Digital signature / Password / Steganography / Cryptography / Key management / Public-key cryptography

Security  Highlights   The  IBM  Mobile  Iden7ty  framework  has  embraced  several  industry  standards  to  allow  applica7on   developers  to  create  secure  s

Add to Reading List

Source URL: www-01.ibm.com

Language: English - Date: 2014-11-20 11:27:30
294Cryptographic protocols / Internet protocols / Internet standards / X.509 / Public key certificate / Public key infrastructure / Certificate authority / X.500 / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Key management

ReportThe Internet Infrastructure Foundation Kirei 2011:19

Add to Reading List

Source URL: www.iis.se

Language: English - Date: 2013-09-02 04:02:13
295Internet protocols / Transmission Control Protocol / Secure multi-party computation / Public-key cryptography / Email / Peer-to-peer / Port / Cryptography / Cryptographic protocols / Computing

PDF Document

Add to Reading List

Source URL: galois.com

Language: English - Date: 2014-08-27 14:21:33
296Internet protocols / Cryptographic protocols / Cross-domain solution / Server / Application layer / Hypertext Transfer Protocol / Transport Layer Security / Windows Server / Features new to Windows XP / Computing / Internet / Network architecture

High Speed Guard Automated, High-Performance Data Transfer. Features and Benefits

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
297Public-key cryptography / Key encapsulation / Ciphertext indistinguishability / Cipher / Cryptographic protocol / Semantic security / Key / Standard model / Transport Layer Security / Cryptography / ID-based encryption / Advantage

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-30 11:15:58
298Software / Cryptographic software / Password / LastPass Password Manager / Internet protocols / Internet standards / Secure Shell / Computer security / File Transfer Protocol / Security / Identity management / Computing

Introduction to backups and security by Suzette Franck September 5, 2012

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2014-09-05 14:28:54
299Universal composability / Secure multi-party computation / Information-theoretic security / Zero-knowledge proof / Communications protocol / Actor model / Cryptography / Cryptographic protocols / Secure two-party computation

Information-Theoretically Secure Protocols and Security Under Composition∗ Eyal Kushilevitz† Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-20 09:14:45
300Internet protocols / Data / Cryptographic software / Computer network security / Skype / Password / Extensible Authentication Protocol / RADIUS / Two-factor authentication / Computing / Internet standards / Internet

S HAR EPLAN T E C HN I CA L SPEC IFICATIO N S Security

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-04-27 09:38:13
UPDATE