Cryptographic protocol

Results: 1374



#Item
481Cryptographic protocols / Object-oriented programming / Communications protocol / Data transmission / Protocols / Trusted system / Cryptography / Universal composability / Computer security / Computing / Security / Data

On Adversary Models and Compositional Security Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia and Dilsun Kaynar Carnegie Mellon University Abstract We present a representative development in the science of security

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
482Computer security / MS-CHAP / LM hash / Point-to-Point Tunneling Protocol / Password / Authentication protocol / Challenge-response authentication / NTLM / Cryptographic hash function / Cryptography / Computing / Internet protocols

Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Bruce Schneier Mudge Counterpane Systems L0pht Heavy Industries

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
483Internet Protocol / Universal Mobile Telecommunications System / Cryptographic protocols / 3GPP Long Term Evolution / Ericsson / IPsec / Aricent Group / Flat IP / Continuous Computing / Technology / Computing / Electronics

FOR FURTHER INFORMATION CONTACT: Aaron Frank Berkeley PR T: + 0909 E:

Add to Reading List

Source URL: www.adax.com

Language: English - Date: 2014-10-17 09:33:00
484Hash list / LOCKSS / Transmission Control Protocol / Localhost / Hash function / Computing / Network architecture / Information science / Error detection and correction / Cryptographic hash functions / Hashing

file:///tmp/voter-good.txt # Receive Poll message, create V3Voter to handle it 16:09:59.842: Debug: 3-V3Voter: ThreadId 3 is SCommRcv: TCP:[]::09:59.842: Debug3: 3-V3Voter: Creating V3 Voter for poll: H

Add to Reading List

Source URL: documents.clockss.org

Language: English - Date: 2014-07-21 13:42:30
485Online chat / Electronic commerce / Diffie–Hellman key exchange / Email / Internet Relay Chat / XTR / RSA / Man-in-the-middle attack / Transmission Control Protocol / Cryptography / Cryptographic protocols / Computing

Apres - A System For Anonymous Presence Ben Laurie Step 2, 17 Perryn Road, London W3 7LR, United Kingdom Abstract. If Alice wants to know when Bob is online, and they don’t want anyone else to know th

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2009-01-02 13:32:36
486Technology / Computer network security / Wireless / Electronic engineering / Wireless access point / Wi-Fi / Wireless LAN / Temporal Key Integrity Protocol / DBm / Cryptographic protocols / Wireless networking / IEEE 802.11

Microsoft Word - EPI-3601S.doc

Add to Reading List

Source URL: www.keenansystems.com

Language: English - Date: 2013-02-14 11:18:32
487Cryptographic protocols / Internet protocols / Computer network security / Internet Protocol / Multihoming / Host Identity Protocol / Internet Key Exchange / Packet Processing / Transmission Control Protocol / Network architecture / Computing / Data

Internet Engineering Task Force (IETF) R. Moskowitz, Ed. Request for Comments: 7401 HTT Consulting Obsoletes: 5201 T. Heer

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-04-09 16:39:00
488LOCKSS / Hash list / Transmission Control Protocol / Localhost / Network architecture / Computing / Internet / Cryptographic hash functions / Hashing / Error detection and correction

file:///tmp/voter-bad.txt # Receive a Poll message and create a V3Voter to handle it 19:30:47.331: Debug: 3-V3Voter: ThreadId 3 is SCommRcv: TCP:[]::30:47.332: Debug3: 3-V3Voter: Creating V3 Voter for p

Add to Reading List

Source URL: documents.clockss.org

Language: English - Date: 2014-07-21 13:43:31
489Cryptographic protocols / Technology / Cryptography / IEEE 802.11 / Wi-Fi / Extensible Authentication Protocol / IEEE 802.1X / Wireless security / Wi-Fi Protected Access / Wireless networking / Computing / Computer network security

Microsoft Word - ORiNOCO security paper v2.2.doc

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:22:48
490Internet protocols / Internet standards / Cryptographic software / Remote administration software / Secure Shell / FTP / Telnet / Comparison of SSH servers / File Transfer Protocol / Computing / System software / Internet

slide 2 gaius slide 1 gaius

Add to Reading List

Source URL: floppsie.comp.glam.ac.uk

Language: English - Date: 2015-02-04 11:33:11
UPDATE