Cryptographic protocol

Results: 1374



#Item
461Data / Kerberos / Needham–Schroeder protocol / Information / Cryptographic nonce / Cyberwarfare / Cryptographic protocols / Cryptography / Computer network security

Secrecy Analysis in Protocol Composition Logic Arnab ROY a , Anupam DATTA b , Ante DEREK c , John C. MITCHELL a , and Jean-Pierre SEIFERT d a Stanford University, USA

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-11-29 16:22:57
462Cryptographic protocols / Internet protocols / Internet standards / Asia-Pacific Network Information Centre / X.509 / Revocation list / Online Certificate Status Protocol / Public key certificate / Public key infrastructure / Cryptography / Public-key cryptography / Key management

Update Critical Infrastructure to Include PKI Tom Paseka APNIC-34, 30 August Phnom Penh Introduction

Add to Reading List

Source URL: conference.apnic.net

Language: English - Date: 2012-08-28 03:31:53
463Directory services / Internet protocols / Cryptographic protocols / Revocation list / X.509 / Lightweight Directory Access Protocol / X.500 / Public key certificate / Public key infrastructure / Cryptography / Public-key cryptography / Key management

World Leading Directory Technology White Paper: ViewDS and PKI Identity Management and XML Directory Services Solutions

Add to Reading List

Source URL: viewds.com

Language: English - Date: 2015-03-12 01:00:36
464Information / Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / Burrows–Abadi–Needham logic / Communications protocol / Public-key cryptography / Transmission Control Protocol / Otway–Rees protocol / Cryptographic protocols / Data / Cryptography

A General Approach to the Verification of Cryptographic Protocols using Answer Set Programming James P. Delgrande, Torsten Grote, and Aaron Hunter School of Computing Science, Simon Fraser University,

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:50:51
465Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Trie / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2008-06-22 07:14:34
466Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security

Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:33:31
467Computing / Computer network security / Data / IEEE 802.11 / Secure communication / IEEE 802.11i-2004 / IEEE 802.1X / Wireless security / Extensible Authentication Protocol / Cryptography / Cryptographic protocols / Wireless networking

Microsoft Word - NDSS05.doc

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-06-17 01:35:04
468Secure communication / Security / Internet protocols / Internet standards / HTTP / Transport Layer Security / HTTP Secure / Password / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Computing

Crypton: Zero-Knowledge Application Framework Cam Pedersen David Dahl Engineer, Crypton

Add to Reading List

Source URL: crypton.io

Language: English - Date: 2014-11-11 16:05:14
469Dolev-Yao model / Public-key cryptography / Protocol composition logic / XTR / Cryptographic primitive / Semantic security / Secure channel / Key-agreement protocol / Commitment scheme / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:37:13
470Internet protocols / Internet standards / Electronic commerce / X.509 / Online Certificate Status Protocol / Internet Engineering Task Force / Public key certificate / Microsoft CryptoAPI / Cryptography / Public-key cryptography / Cryptographic protocols

JNSA Challenge PKI 2002 ? Work in progress ? An approach of Multi-Domain PKI Test Suite

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-07-10 05:05:00
UPDATE