Cryptographic protocol

Results: 1374



#Item
491Cryptographic protocols / Certificate policy / Revocation list / X.509 / Public key certificate / Online Certificate Status Protocol / Certificate authority / Public key infrastructure / Verisign / Cryptography / Public-key cryptography / Key management

KPN Corporate Market B.V. Certification Practice Statement Symantec Trust Network

Add to Reading List

Source URL: certificaat.kpn.com

Language: English - Date: 2014-09-29 04:50:48
492Computer security / Computer network security / Security service / Non-repudiation / Public key infrastructure / Deniable authentication / Plausible deniability / Key-agreement protocol / Information security / Cryptography / Public-key cryptography / Cryptographic protocols

Cryptography and Evidence Michael Roe Clare College A dissertation submitted for the degree of Doctor of Philosophy in the University of Cambridge

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 1999-08-17 09:51:55
493Internet protocols / Internet standards / Cryptographic protocols / Secure communication / FTP / File Transfer Protocol / Secure Shell / Transport Layer Security / Telnet / Internet / Computing / Network architecture

SafeTP: Transparently Securing FTP Network Services Dan Bonachea and Scott McPeak CS Division, EECS Department University of California, Berkeley {bonachea,smcpeak}@cs.berkeley.edu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2004-11-10 21:04:17
494Computer security / Internet / Cryptographic protocols / Computer network security / CoSign single sign on / SPNEGO / Kerberos / Shibboleth / Lightweight Directory Access Protocol / Internet standards / Federated identity / Computing

Stanford University July 26, 2014 Stanford Web Authentication Overview

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
495Cryptographic protocols / Certificate policy / Revocation list / X.509 / Public key certificate / Online Certificate Status Protocol / Certificate authority / Verisign / Public key infrastructure / Cryptography / Public-key cryptography / Key management

KPN Corporate Market B.V. Certification Practice Statement Version 3.4

Add to Reading List

Source URL: certificaat.kpn.com

Language: English - Date: 2013-05-07 03:38:44
496Cryptographic protocols / Internet protocols / Internet standards / Certificate policy / Revocation list / X.509 / Public key certificate / Certificate authority / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Key management

Getronics Certification Practice Statement Version 3.2

Add to Reading List

Source URL: certificaat.kpn.com

Language: English - Date: 2012-03-06 06:32:24
497Error detection and correction / Hash function / Transmission Control Protocol / One-way compression function / CBC-MAC / Cryptography / Hashing / Cryptographic hash functions

CS255: Cryptography and Computer Security Winter 2005 Assignment #2 Due: Wednesday, February 16th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-02-08 17:18:01
498Cryptographic protocols / Remote administration software / SSHFS / Secure Shell / Rsync / SSH File Transfer Protocol / Filesystem in Userspace / System software / Software / Computing

slide 1 gaius SSH FileSystem there is a filesystem client based on the SSH File Transfer Protocol

Add to Reading List

Source URL: floppsie.comp.glam.ac.uk

Language: English - Date: 2015-02-04 11:33:11
499Secure communication / Data / Internet / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / HTTP Secure / TLS-SRP / Cryptographic protocols / Internet protocols / Computing

draft-ietf-tls-downgrade-scsv-05 - TLS Fallback Signaling Cipher Suite Value …SCSV— for Preventing Protocol Downgrade Attacks

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-02-19 20:20:25
500Cryptography / Computer network security / Technology / IEEE 802.11 / Wi-Fi / Wpa supplicant / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / Wireless networking / Cryptographic protocols / Computing

PROXIM AND WI-FI PROTECTED ACCESS (WPA) What is WPA? As an intermediate WLAN security solution that can be applied to existing WLAN client hardware, the Wi-Fi Alliance has adopted Wi-Fi Protected Access (WPA). Proxim wil

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:22:48
UPDATE