Cryptographic protocol

Results: 1374



#Item
591Cryptographic protocols / Technology / IEEE 802.11 / Wireless / Wireless security / IEEE 802.11i-2004 / IEEE 802.1X / Extensible Authentication Protocol / Wireless LAN / Wireless networking / Computer network security / Computing

Wireless LAN Access Control and Authentication 802.11b Wireless Networking and Why It Needs Authentication

Add to Reading List

Source URL: www.interlinknetworks.com

Language: English - Date: 2012-02-18 13:55:27
592Tunneling protocols / Network architecture / Data / Computer network security / IPsec / Internet protocol suite / Virtual private network / Computing / Cryptographic protocols / Internet protocols

Wind River Documentation Profile for VPNC Interoperability WIND NET IPsec and IKE, [removed]Overview This document describes how to configure WIND NET IPsec and IKE 3.0 for

Add to Reading List

Source URL: www.vpnc.org

Language: English - Date: 2004-12-04 20:21:18
593Cryptographic protocols / Secure communication / Electronic commerce / HTTP Secure / Public key certificate / Transport Layer Security / Certificate authority / Extended Validation Certificate / X.509 / Cryptography / Public-key cryptography / Key management

SSL FAQ Q: What is SSL? A: Secure Sockets Layer (SSL) is a protocol for enabling data encryption on the Internet and for helping web site users confirm the owner of the web site. SSL is most commonly used to protect comm

Add to Reading List

Source URL: dca.org.au

Language: English - Date: 2010-12-02 20:25:55
594Computer security / Internet standards / Code division multiple access / Computer network security / Cryptographic protocols / AAA protocol / RADIUS / OAuth / Kerberos / Computing / Internet protocols / Internet

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Add to Reading List

Source URL: www6.ietf.org

Language: English - Date: 2014-03-02 06:27:58
595Information / Internet Security Association and Key Management Protocol / IPsec / Oakley protocol / KMP / Cisco PIX / IPv4 / Cryptographic protocols / Data / Computing

Cisco PIX Interoperability Guide Copyright © [removed], bww bitwise works GmbH.. All Rights Reserved. The use and copying of this product is subject to a license agreement. Any other use is strictly prohibited. No part

Add to Reading List

Source URL: www.bitwiseworks.com

Language: English - Date: 2014-02-25 08:50:47
596Internet / Public key certificate / Online Certificate Status Protocol / URI scheme / Information / Data / 7C / Public-key cryptography / Cryptographic protocols / X.509

ÍSLAND (ICELAND) - Trusted List ID:

Add to Reading List

Source URL: www.neytendastofa.is

Language: English - Date: 2015-03-02 04:45:03
597Electronic commerce / Public-key cryptography / Cryptographic software / Transport Layer Security / HTTP Secure / OpenSSL / Transmission Control Protocol / X.509 / Public key certificate / Cryptography / Cryptographic protocols / Secure communication

An Introduction to OpenSSL Programming (Part I) Eric Rescorla RTFM, Inc. [removed] Version 1.0: October 5, 2001

Add to Reading List

Source URL: www.rtfm.com

Language: English
598Internet protocols / Tunneling protocols / Data / Computer network security / IPsec / Virtual private networks / Layer 2 Tunneling Protocol / Internet Key Exchange / Computing / Network architecture / Cryptographic protocols

IPSec Plugin Reference Manual 4.2 Copyright © [removed], bww bitwise works GmbH.. All Rights Reserved. The use and copying of

Add to Reading List

Source URL: www.bitwiseworks.com

Language: English - Date: 2014-02-25 08:50:51
599Information / Cryptographic protocols / Cryptography standards / Radio-frequency identification / FIPS 140-2 / Public-key cryptography / Smart card / Communications protocol / Cryptographic engineering / Cryptography / Ubiquitous computing / Technology

4-4 R  esearches on Cryptographic Protocols — Standardization and Global Collaborations — MATSUO Shin’ichiro and OHKUBO Miyako Cryptography is fundamental technique to achieve security property in information sys

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:08:17
600Bluetooth / Wireless / Key-agreement protocol / Authentication / Man-in-the-middle attack / Advanced Encryption Standard / Cryptography / Technology / Cryptographic protocols

Bypassing Passkey Authentication in Bluetooth Low Energy (extended abstract) Tomáš Rosa [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-23 07:35:21
UPDATE