Cryptographic protocol

Results: 1374



#Item
401Internet standards / Internet protocols / FTP / Cryptographic protocols / Secure communication / Transport Layer Security / File Transfer Protocol / Comparison of FTP client software / HTTP Secure / Computing / Internet / Network architecture

Momentum Systems White Paper: Securing and Integrating File Transfers Over the Internet Securing and Integrating File Transfers Over the Internet

Add to Reading List

Source URL: www.momsys.com

Language: English - Date: 2012-03-26 15:32:48
402Commitment scheme / Universal composability / Oblivious transfer / Semantic security / RSA / Diffie–Hellman key exchange / Communications protocol / Cipher / Cryptography / Cryptographic protocols / ID-based encryption

An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-02 11:56:16
403Computing / Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
404Tunneling protocols / Data / Computer network security / Internet protocols / IPsec / Network protocols / Internet security / Internet Security Association and Key Management Protocol / Point-to-Point Tunneling Protocol / Computing / Cryptographic protocols / Network architecture

A Cryptographic Evaluation of IPsec Niels Ferguson? and Bruce Schneier?? Counterpane Internet Security, Inc., 3031 Tisch Way, Suite 100PE, San Jose, CAhttp://www.counterpane.com

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
405Diffie–Hellman key exchange / RSA / XTR / Password / Key / Secure Remote Password protocol / Password-authenticated key agreement / Cryptography / Cryptographic protocols / SPEKE

Secure Sessions from Weak Secrets Michael Roe1 Bruce Christianson2 David Wheeler3 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:39
406Network architecture / Secure Shell / File Transfer Protocol / Diaeresis / Comparison of SSH servers / Cryptographic software / Internet / Computing

SSH Access Contract Please complete this form to apply for SSH access on your web hosting account. Please remember that in most cases FTP or our online file manager can be used to manage your account including editing fi

Add to Reading List

Source URL: www.varihost.net

Language: English - Date: 2010-05-26 03:22:48
407Cryptographic protocols / Internet protocols / Internet standards / Keystore / Public-key cryptography / Lightweight Directory Access Protocol / Authentication / Security token / Digest access authentication / Cryptography / Computing / Security

Oracle GlassFish Server Security Guide ReleaseE24940-01 February 2012

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-04-09 12:56:08
408Internet protocols / Computer network security / Information / TCP/IP / Secure communication / Tcpcrypt / Transmission Control Protocol / Secure Shell / Wireless security / Cryptographic protocols / Computing / Data

The case for ubiquitous transport-level encryption Andrea Bittau Stanford Michael Hamburg Stanford

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-06-02 14:19:01
409Computing / Password-authenticated key agreement / Diffie–Hellman key exchange / XTR / Diffie–Hellman problem / File Transfer Protocol / Password / Password Authenticated Key Exchange by Juggling / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol ? SeongHan Shin1 , Kazukuni Kobara1 , and Hideki Imai2,1 1 Research Center for Information Security (RCIS),

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-21 19:36:43
410Cryptographic protocols / Revocation list / Public key certificate / X.509 / Extended Validation Certificate / Certificate authority / Online Certificate Status Protocol / Phishing / Root certificate / Cryptography / Public-key cryptography / Key management

C:/Users/zhdong/Dropbox/Papers/SVN/certificates/TPRC14/TPRC14_v5.dvi

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2014-09-05 20:41:02
UPDATE