Cryptographic protocol

Results: 1374



#Item
311Cryptographic protocols / Secure communication / Internet standards / HTTP / Transport Layer Security / HTTP Secure / Hypertext Transfer Protocol / Reverse proxy / Dynamic SSL / Computing / Internet / Network architecture

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T. Lesniewski-Laas S.B., Massachusetts Institute of Technology (2001)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:14
312Internet protocols / Cryptographic protocols / Cryptographic software / PKI Resource Query Protocol / Cryptography / Public-key cryptography / Key management

Specification Problem around Multi PKI domain

Add to Reading List

Source URL: www.jnsa.org

Language: English - Date: 2006-11-05 21:38:35
313Kerberos / Needham–Schroeder protocol / Cryptographic nonce / Public-key cryptography / IP / Cryptographic protocols / Cryptography / Computer network security

Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:22:30
314Cryptographic protocols / Computing / Burrows–Abadi–Needham logic / Cryptographic nonce / Challenge-response authentication / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / Cryptography / Data / Information

Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:52:04
315Communications protocol / Data transmission / Protocols / Public-key cryptography / Cryptographic protocols / Network protocols / Cryptography / Data / Information

Compositional Analysis of Contract Signing Protocols Michael Backes a , Anupam Datta b , Ante Derek b , John C. Mitchell b and Mathieu Turuani c a Saarland

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:01:14
316Ciphertext indistinguishability / Public-key cryptography / Internet Key Exchange / Whitfield Diffie / Index of cryptography articles / Station-to-Station protocol / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Formal Proofs of Cryptographic Security of Diffie-Hellman-based Protocols Arnab Roy1 , Anupam Datta2 , John C. Mitchell1 1 2

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-10-07 02:05:31
317Electronic commerce / Secure communication / Computing / Internet / Public key certificate / Security / HTTP Secure / Simple Mail Transfer Protocol / Cryptographic protocols / Public-key cryptography / Key management

Zedmed Setting up access to the HI Service July 2012 Setting up access to the HI Service

Add to Reading List

Source URL: zedmed.com.au

Language: English - Date: 2012-11-26 00:43:28
318Private information retrieval / Transmission Control Protocol / Quadratic residue / RSA / Cryptography / Cryptographic protocols / Oblivious transfer

Single Database Private Information Retrieval with Logarithmic Communication Yan-Cheng Chang Harvard University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-02-10 23:35:25
319Computing / Internet standards / OpenBSD / OpenSSH / Secure Shell / Computer network security / Password / Generic Security Services Application Program Interface / Lightweight Directory Access Protocol / System software / Software / Cryptographic software

FreeIPA Training Series SSSD and OpenSSH Integration Jan Cholasta

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-06-06 07:16:17
320Secure multi-party computation / Computing / Universal composability / Communications protocol / Verifiable secret sharing / Boolean algebra / Π-calculus / Consensus / Cryptographic protocols / Data / Information

An Equational Approach to Secure Multi-party Computation∗ Daniele Micciancio† Stefano Tessaro‡ January 12, 2013

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-09-26 16:14:53
UPDATE