Cryptographic protocol

Results: 1374



#Item
651Cryptographic protocols / Internet protocols / Internet standards / Revocation list / Online Certificate Status Protocol / Certificate policy / Public key certificate / Certificate authority / Public key infrastructure / Cryptography / Public-key cryptography / Key management

Queensland Government Information Security Framework UNCLASSIFIED CONSULTATION[removed]September 2008

Add to Reading List

Source URL: t4c47.pki.qld.gov.au

Language: English - Date: 2013-08-05 22:04:40
652Hardware-based full disk encryption / Common Criteria / Security Target / Key / Cryptographic protocol / Public-key cryptography / Protection Profile / Encryption / Password / Cryptography / Disk encryption / Evaluation

Supporting Document Mandatory Technical Document Full Drive Encryption: Encryption Engine January 2015 Version 1.0

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2015-02-27 15:31:27
653Internet Engineering Task Force / Internet standards / Cryptographic protocols / Network architecture / Transport Layer Security / Internet / Computing / Transmission Control Protocol

Starting on TLS 1.3 Eric Rescorla [removed] IETF 85

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2013-11-05 17:12:40
654Computer network security / IEEE 802.11 / Computing / Technology / Wi-Fi Protected Access / IEEE 802.11i-2004 / Wireless security / Extensible Authentication Protocol / Wired Equivalent Privacy / Cryptography / Wireless networking / Cryptographic protocols

Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2) Paul Arana INFS 612 – Fall 2006 Abstract With the increase in use of Wireless Networks, the

Add to Reading List

Source URL: cs.gmu.edu

Language: English - Date: 2006-11-29 23:32:26
655Computing / Security service / Cryptographic protocol / Computer security / Threat / Computer network security / Security / Cyberwarfare

Introduction to the Security Area (the one area to rule them all) Alexey Melnikov & Sean Turner[removed]

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2014-11-21 15:36:58
656Information / Public-key cryptography / Electronic commerce / Secure communication / PKCS / Smart card / Communications protocol / Secure Electronic Transaction / Deniable authentication / Cryptography / Cryptographic protocols / Data

Making Sense of Specifications: the Formalization of SET (Extended Abstract) Giampaolo Bella1 , Fabio Massacci2,3 , Lawrence C. Paulson1 , and Piero Tramontano3 1

Add to Reading List

Source URL: www.ing.unitn.it

Language: English - Date: 2004-10-19 21:06:10
657Communications protocol / Computing / Cryptographic protocols / Extension / Mac OS

Meeting protocols The Safety, Rehabilitation and Compensation Commission (the SRCC) has endorsed protocols in relation to the submission of materials in regard to its consideration of licence applications and extensions

Add to Reading List

Source URL: www.srcc.gov.au

Language: English - Date: 2013-01-07 18:56:36
658Computing / Internet protocols / Secure Shell / OpenSSH / Comparison of SSH servers / Port scanner / Ident / Port / Transmission Control Protocol / System software / Software / Cryptographic software

CITI Technical Report[removed]ScanSSH - Scanning the Internet for SSH Servers Niels Provos Peter Honeyman {provos,honey}@citi.umich.edu

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2001-10-17 11:48:24
659Network architecture / Cryptographic protocols / Secure communication / Internet standards / Internet privacy / Hypertext Transfer Protocol / Transport Layer Security / Web server / HTTP Secure / Computing / Internet / HTTP

HanWEB Fanjian Translation Server: Network Connectivity Overview

Add to Reading List

Source URL: www.kanhan.com

Language: English - Date: 2013-12-16 12:14:05
660Cryptographic protocols / Secure communication / Electronic commerce / HTTP Secure / Public key certificate / Transport Layer Security / Certificate authority / Extended Validation Certificate / X.509 / Cryptography / Public-key cryptography / Key management

SSL FAQ Q: What is SSL? A: Secure Sockets Layer (SSL) is a protocol for enabling data encryption on the Internet and for helping web site users confirm the owner of the web site. SSL is most commonly used to protect comm

Add to Reading List

Source URL: www.dca.org.au

Language: English - Date: 2010-12-02 20:25:55
UPDATE