Cryptographic protocol

Results: 1374



#Item
341Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

IKEv2&VPN&with&OpenBSD&iked(8) EuroBSDCon&2010@10@09,&Karlsruhe Reyk&Flöter&() Agenda • Why&another&VPN&protocol?

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2012-12-20 07:31:37
342Portable software / Data synchronization / Victorian Partnership for Advanced Computing / Secure Shell / PuTTY / Lustre / WinSCP / Comparison of SSH clients / File Transfer Protocol / Software / Computing / Cryptographic software

e‐Research Office &  Information Communications Technology    TECHNICAL  NOTE 2: 

Add to Reading List

Source URL: www.latrobe.edu.au

Language: English - Date: 2015-03-22 18:57:13
343Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

OpenIKED,  AsiaBSDCon  2013 Reyk  Flöter  () ライクフローター Agenda

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2013-04-02 16:02:23
344Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

OpenIKED,  AsiaBSDCon  2013 Reyk  Flöter  () ライクフローター Agenda

Add to Reading List

Source URL: openbsd.comstyle.com

Language: English - Date: 2013-04-02 16:02:23
345Cryptographic protocols / Information / Transmission Control Protocol / Transport Layer Security / OASIS / Advanced Message Queuing Protocol / Computing / Data / Internet protocols

MQTT VersionCommittee Specification Draft 01 / Public Review DraftDecember 2013 Specification URIs This version:

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2013-12-12 12:00:00
346Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

OpenIKED,  AsiaBSDCon  2013 Reyk  Flöter  () ライクフローター Agenda

Add to Reading List

Source URL: www.openbsd.org.my

Language: English - Date: 2013-04-02 16:02:23
347Computer network security / Data / Internet protocols / Virtual private networks / Cryptographic protocols / Layer 2 Tunneling Protocol / NAT traversal / Voice over IP / Point-to-point protocol over Ethernet / Computing / Network architecture / Tunneling protocols

Release Notes 7800X Series 2.32d New features & Enhancements 1. VPN (VPN models only) 1-1 Add MTU setting on IPSec configuration

Add to Reading List

Source URL: au.billion.com

Language: English - Date: 2014-01-21 03:57:45
348Quantum information science / Cryptographic protocols / Quantum key distribution / Secure Communication based on Quantum Cryptography / Symmetric-key algorithm / Public-key cryptography / Key size / Key distribution / Key-agreement protocol / Cryptography / Key management / Quantum cryptography

SECOQC White Paper on Quantum Key Distribution and Cryptography Reference: Secoqc-WP-v5 Document type: White Paper Document Date: January

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
349Cryptographic protocols / Internet standards / Email / Internet protocols / Secure communication / Simple Mail Transfer Protocol / File Transfer Protocol / HTTP Secure / Client–server model / Computing / Internet / Network architecture

Secure Automated Document Delivery Tom Casey Michael Roe Bill Tuck

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:25
350Notary / Cryptographic protocols / Kerberos / Digital signature / Public key infrastructure / Key / Government Communications Headquarters / Shared secret / Cipher / Cryptography / Key management / Public-key cryptography

The GCHQ Protocol and its Problems Ross Anderson, Michael Roe Cambridge University Computer Laboratory Pembroke Street, Cambridge CB2 3QG Email: (rja14,mrr)@cl.cam.ac.uk

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:43
UPDATE