Cryptographic protocol

Results: 1374



#Item
361Cryptographic software / Network architecture / Port forwarding / Remote administration software / Internet protocols / Tunneling protocol / Proxy server / Computing / Internet / Secure Shell

GSW Business Tunnel Example L03

Add to Reading List

Source URL: www.georgiasoftworks.com

Language: English - Date: 2015-02-03 15:01:59
362Data / Tunneling protocols / Internet protocols / Computer network security / Virtual private networks / Internet Key Exchange / IPsec / OpenVPN / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Network architecture

OpenIKED Reyk Floeter () February 2013 Abstract This paper introduces the OpenIKED project[14], the latest portable subproject of OpenBSD[13].

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2013-04-02 16:02:23
363Oblivious transfer / Decisional Diffie–Hellman assumption / Commitment scheme / Secure multi-party computation / Communications protocol / Zero-knowledge proof / Proof of knowledge / Cryptography / Cryptographic protocols / Universal composability

Efficient Fully-Simulatable Oblivious Transfer∗ Yehuda Lindell† Department of Computer Science Bar-Ilan University, Israel.

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2008-12-21 16:22:00
364Checksum / BIOS / Booting / Hash function / Transmission Control Protocol / Cryptographic hash function / GNU GRUB / Cksum / Stack / Computing / Software / System software

On the Difficulty of Validating Voting Machine Software with Software∗ Ryan Gardner† Sujata Garera†

Add to Reading List

Source URL: accurate-voting.org

Language: English - Date: 2013-06-05 15:32:08
365Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

OpenIKED,  AsiaBSDCon  2013 Reyk  Flöter  () ライクフローター Agenda

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2013-04-02 16:02:23
366Cryptography / Challenge-response authentication / IP / Alice and Bob / Baseband / Modulation / Channel / Distance-bounding protocol / Cryptographic protocols / Information / Data

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System ˇ Aanjhan Ranganathan1 , Nils Ole Tippenhauer1 , Boris Skori´ c2 , Dave Singel´ee3 , 1

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2013-03-16 15:45:20
367Internet standards / Cryptographic protocols / Internet protocols / Secure communication / Electronic commerce / FTPS / Transport Layer Security / HTTP Secure / File Transfer Protocol / Internet / Computing / Network architecture

Secure Transfers Contents SSL-Based Services: HTTPS and FTPS 2

Add to Reading List

Source URL: www.maxumdev.com

Language: English - Date: 2013-12-10 16:46:14
368Computing / Malware / Cryptographic nonce / Bluetooth / Computer network / Electronic engineering / Computer network security / Wireless security / Extensible Authentication Protocol / Technology / Mobile computers / Mobile device management

Enabling Users to Self-Manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks Zheng Dong School of Informatics and Computing, Indiana University, Bloomington, IN, USA Abstr

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2012-08-12 01:47:18
369Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

IKEv2&VPN&with&OpenBSD&iked(8) EuroBSDCon&2010@10@09,&Karlsruhe Reyk&Flöter&() Agenda • Why&another&VPN&protocol?

Add to Reading List

Source URL: openbsd.comstyle.com

Language: English - Date: 2012-12-20 07:31:37
370Data / Tunneling protocols / Internet protocols / Computer network security / Virtual private networks / Internet Key Exchange / IPsec / OpenVPN / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Network architecture

OpenIKED Reyk Floeter () February 2013 Abstract This paper introduces the OpenIKED project[14], the latest portable subproject of OpenBSD[13].

Add to Reading List

Source URL: openbsd.aise.re

Language: English - Date: 2013-04-02 16:02:23
UPDATE