Cryptographic protocol

Results: 1374



#Item
301Diffie–Hellman problem / Key-agreement protocol / Public-key cryptography / Key exchange / Elliptic curve cryptography / ID-based encryption / Internet Key Exchange / Boneh/Franklin scheme / Elliptic curve Diffie–Hellman / Cryptographic protocols / Cryptography / Diffie–Hellman key exchange

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 06:49:50
302Portable software / Secure Shell / WinSCP / PuTTY / File Transfer Protocol / Comparison of SSH clients / Comparison of FTP client software / Software / Cryptographic software / Computing

PDF Document

Add to Reading List

Source URL: www.deifwindpower.com

Language: English - Date: 2014-06-13 07:25:06
303Internet standards / Cryptographic protocols / Computer data / AS2 / Internet protocols / AS3 / SSH File Transfer Protocol / Email / File Transfer Protocol / Computing / Internet / Data

Connecting to the EMEA ESTRI Gateway using an AS2 or AS3 compatible product. You will need to provide the following information to the EMEA, and we will create a profile on our system for you. The information about our

Add to Reading List

Source URL: esubmission.ema.europa.eu

Language: English - Date: 2015-05-07 06:59:37
304Computing / Cryptographic protocols / Datagram Transport Layer Security / Middlebox / Spud / Protocol stack / Communications protocol / Data / Information / Internet protocols

Substrate Protocol for User Datagrams (SPUD) Status Joe Hildebrand

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-03-23 11:03:18
305Internet standards / Internet protocols / Cryptographic protocols / Secure communication / Public-key cryptography / Transmission Control Protocol / Lightweight Directory Access Protocol / Transport Layer Security / Certificate authority / Cryptography / Computing / Internet

SSL Protocol The Transmission Control Protocol/Internet Protocol (TCP/IP) governs the transport and routing of data over the Internet. Other protocols, such as the Hypertext Transport Protocol (HTTP), Lightweight Directo

Add to Reading List

Source URL: www.cryptoheaven.com

Language: English - Date: 2011-03-01 12:16:22
306Logic / Computing / Mathematics / Theoretical computer science / Burrows–Abadi–Needham logic / Free variables and bound variables / Π-calculus / Needham–Schroeder protocol / Applied mathematics / Cryptographic protocols / Cryptography / Predicate logic

Journal of Computer Security–721 IOS Press 677 A compositional logic for proving security properties of

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-12-15 20:24:55
307Computing / Internet protocols / Security / Internet standards / Transport Layer Security / Cipher suite / HTTP Secure / Public-key cryptography / Key / Cryptography / Secure communication / Cryptographic protocols

SSL and TLS An Overview of A Secure Communications Protocol Simon Horman aka Horms

Add to Reading List

Source URL: horms.net

Language: English - Date: 2005-04-17 17:27:10
308Computing / Network architecture / Secure communication / Cryptographic protocols / Electronic commerce / Transport Layer Security / Transmission Control Protocol / Lightweight Directory Access Protocol / Cipher suite / Internet protocols / Internet standards / Internet

Network Working Group Request for Comments: 4681 Updates: 4346 Category: Standards Track S. Santesson

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2006-10-10 19:17:44
309Computing / Public-key cryptography / Internet / Security / Internet standards / Transport Layer Security / Buffer overflow / HTTP Secure / Transmission Control Protocol / Cryptographic protocols / Secure communication / Electronic commerce

Tales from the Crypt: fingerprinting attacks on encrypted channels by way of retainting Michael Valkering Asia Slowinska

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:38:52
310Needham–Schroeder protocol / Ciphertext indistinguishability / Kerberos / Advantage / XTR / Ticket Granting Ticket / Cryptography / Cryptographic protocols / Computer network security

Inductive Proofs of Computational Secrecy ? Arnab Roy1 , Anupam Datta2 , Ante Derek1 , John C. Mitchell1 1

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:17:14
UPDATE