Cryptographic protocol

Results: 1374



#Item
531Communications protocol / XTR / Transmission Control Protocol / Diffie–Hellman key exchange / Digital signature / Random oracle / Oracle machine / IP / E0 / Cryptography / Cryptographic protocols / Oblivious transfer

The Simplest Protocol for Oblivious Transfer Tung Chou1 and Claudio Orlandi2 1 Technische Universieit Eindhoven 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 06:07:01
532Key management / European Telecommunications Standards Institute / Public key certificate / Digital signature / X.509 / Time stamp protocol / Electronic signature / CAdES / PAdES / Cryptography / Public-key cryptography / Cryptographic protocols

Final draft ETSI EN[removed]V0.0.0

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2015-01-15 09:17:01
533Clinical research / Design of experiments / Pharmacology / Communications protocol / Data transmission / Protocols / Evidence-based practice / Transmission Control Protocol / Cryptographic protocol / Data / Science / Information

March[removed]www.caresearch.com.au EVIDENCE BASED PRACTICE: THE RESEARCH PROTOCOL

Add to Reading List

Source URL: www.caresearch.com.au

Language: English - Date: 2013-03-18 18:07:06
534Key management / X.509 / Public key certificate / Authorization certificate / Cryptographic Message Syntax / Revocation list / Digital signature / Lightweight Directory Access Protocol / S/MIME / Cryptography / Public-key cryptography / Cryptographic protocols

ETSI TS[removed]V1[removed]Technical Specification Electronic signature formats 2

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2002-02-15 04:21:51
535Cryptographic protocols / Internet protocols / Internet standards / X.509 / Public key certificate / Authorization certificate / Certificate policy / Revocation list / Lightweight Directory Access Protocol / Cryptography / Public-key cryptography / Key management

Draft ETSI EN[removed]V2[removed]European Standard Electronic Signatures and Infrastructures (ESI); Certificate Profiles;

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2015-01-15 09:16:52
536Cyberwarfare / Kerberos / Ticket / Challenge-response authentication / Alice and Bob / Key distribution center / Public-key cryptography / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Cryptography / Computer network security / Cryptographic protocols

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2005-12-06 23:10:45
537Network architecture / Data / Computer network security / Tunneling protocols / Internet standards / IPsec / Simple Network Management Protocol / Internet Key Exchange / Virtual private network / Computing / Internet protocols / Cryptographic protocols

Communication & Network Security DigiSAFE NetCrypt 10E Small and Rugged IP Encryptor

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 02:05:33
538Group signature / Oblivious transfer / Public-key cryptography / Communications protocol / Signature / Cryptographic protocol / ElGamal signature scheme / Cryptography / Blind signature / Digital signature

Fair Blind Signatures Markus Stadler1 , Jean-Marc Piveteau2 , Jan Camenisch1 1 Institute for Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: www.ubilab.org

Language: English - Date: 2013-09-04 09:24:20
539Internet protocols / Key management / Internet standards / Online Certificate Status Protocol / Revocation list / X.509 / OCSP stapling / Public key certificate / HTTP Secure / Cryptography / Public-key cryptography / Cryptographic protocols

Policy Manager - White Paper

Add to Reading List

Source URL: www.elock.com

Language: English
540Public-key cryptography / Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Transmission Control Protocol / IPsec / Domain Name System Security Extensions / Public key infrastructure / Cryptography / Internet protocols / Internet

1. Introduction A reliable distributed network service requires provisions to prevent accidental or malicious attacks on the servers and clients in the network. Reliability requires that clients can determine that receiv

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2000-05-21 14:04:30
UPDATE