Cryptographic protocol

Results: 1374



#Item
511Secret sharing / Proactive secret sharing / Threshold cryptosystem / Communications protocol / Information-theoretic security / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 19:43:29
512Computing / Internet standards / Cryptographic protocols / Public-key cryptography / Network Time Protocol / Transport Layer Security / IPsec / Secure Shell / Network address translation / Internet protocols / Network architecture / Internet

Internet Engineering Task Force (IETF) Request for Comments: 5906 Category: Informational ISSN: [removed]B. Haberman, Ed.

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-06-21 18:53:28
513Data / Public-key cryptography / Diffie–Hellman key exchange / X Window System / Transmission Control Protocol / RADIUS / Cryptography / Cryptographic protocols / Computing

Location Privacy via Private Proximity Testing Arvind Narayanan Narendran Thiagarajan Michael Hamburg

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-12-07 13:19:37
514Secure multi-party computation / Public key infrastructure / Algorithm / Information privacy / Transmission Control Protocol / Preparer Tax Identification Number / Internet privacy / Cryptography / Cryptographic protocols / Public-key cryptography

A Trusted Execution Platform for Multiparty Computation by Sameer Ajmani Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2002-06-04 13:33:05
515Network architecture / File Transfer Protocol / Cryptographic software / LastPass Password Manager / Password manager / Computing / Internet / Password

42goISP Documentation 42goISP Documentation I

Add to Reading List

Source URL: www.projektfarm.de

Language: English - Date: 2005-07-24 11:28:56
516Data / Network architecture / Internet protocols / Tunneling protocols / IPsec / Internet privacy / Internet Security Association and Key Management Protocol / Virtual private network / Internet security / Cryptographic protocols / Computing / Computer network security

Shorewall and Native IPSEC Tom Eastep Linuxfest Northwest April 30, 2005 ©2005 – Thomas M Eastep

Add to Reading List

Source URL: www.shorewall.net

Language: English - Date: 2005-04-29 18:38:00
517Communications protocol / Data transmission / Protocols / Cryptographic protocol / The Protocols of the Elders of Zion / Data / Information / Deception

Application Fees 2015 Program Size (Based on number of active protocols*) Fee (US Dollars)

Add to Reading List

Source URL: admin.share.aahrpp.org

Language: English - Date: 2014-12-18 16:10:15
518Network architecture / Data / Streaming / SDES / ZRTP / Session Initiation Protocol / Secure Real-time Transport Protocol / Telephony / Session border controller / Cryptographic protocols / Computing / Videotelephony

An Introduction to Voice over IP Security July[removed]removed]

Add to Reading List

Source URL: www.hznet.de

Language: English - Date: 2006-09-15 07:09:17
519Network architecture / URI schemes / Internet standards / Cryptographic protocols / Secure communication / HTTP pipelining / Transmission Control Protocol / Hypertext Transfer Protocol / HTTP Secure / Computing / Internet / HTTP

http2 explained Background, the protocol, the implementations and the future http://daniel.haxx.se/http2/ by Daniel Stenberg

Add to Reading List

Source URL: daniel.haxx.se

Language: English - Date: 2015-03-12 08:26:41
520Diffie–Hellman key exchange / Secure Remote Password protocol / Encrypted key exchange / Public-key cryptography / Internet Key Exchange / Salt / SPEKE / Password-authenticated key agreement / Cryptographic protocols / Cryptography / Password

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
UPDATE