Cryptographic protocol

Results: 1374



#Item
681Computer network security / Denial-of-service attacks / Cryptographic protocols / Secure communication / BitTorrent / Denial-of-service attack / Transmission Control Protocol / Man-in-the-middle attack / HTTP Secure / Computing / Software / Cryptography

EE122 Section 12 – Security Question 1 – Crackdown on P2P In 2007, a large broadband provider in the US disrupted end users’ BitTorrent connections with a layer-4 Denial-of-Service (DoS) attack. The provider identi

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2013-12-10 23:49:52
682Security / Cryptographic software / Password / Bluetooth / Near field communication / Man-in-the-middle attack / S/KEY / OTPW / Key-agreement protocol / Technology / Cryptography / Wireless

Attacks on the Pairing Protocol of Bluetooth v2.1 Andrew Y. Lindell∗ June 25, 2008 Abstract The Bluetooth protocol for close-range wireless communication has been a huge success. It

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:40
683Cryptographic protocols / Communications protocol / Data transmission / Protocols / Workgroup / Stormwater / Data / Information / Computing

SUMMARY OF DECISIONS AND ACTIONS CBP WQGIT BMP Verification Committee Meeting Thursday, February 21st, 2012 Chesapeake Bay Program Office Main Conference Room 410 Severn Avenue, Annapolis, MD

Add to Reading List

Source URL: www.chesapeakebay.net

Language: English - Date: 2013-03-05 15:59:20
684Data / StrongSwan / Internet Key Exchange / IPsec / X.509 / RADIUS / Online Certificate Status Protocol / EAP-SIM / Virtual private network / Cryptographic protocols / Computing / Cryptography

Microsoft PowerPoint - LinuxTag2008_Flyer_VPN_Solution.ppt

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2008-06-25 02:51:57
685Information / StrongSwan / Extensible Authentication Protocol / Wireless security / Cryptographic protocols / Computing / Data

The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 08:24:10
686Cryptographic protocols / Internet protocols / Internet standards / X.509 / Revocation list / Online Certificate Status Protocol / Public key certificate / Certificate policy / X.500 / Cryptography / Public-key cryptography / Key management

Network Working Group Request for Comments: 5280 Obsoletes: 3280, 4325, 4630 Category: Standards Track D. Cooper

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2008-05-08 19:00:40
687Computing / Secure multi-party computation / Secure two-party computation / Cryptography / Zero-knowledge proof / Communications protocol / Internet privacy / Universal composability / Verifiable secret sharing / Cryptographic protocols / Data / Information

On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
688Transmission Control Protocol / Secure multi-party computation / Cryptography / Cryptographic protocols / Public-key cryptography

Private Matching Li, Yaping, J.D. Tygar, and Joseph M. Hellerstein IRB-TR[removed]February, 2004

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:48:06
689FTP / Internet protocols / Internet privacy / Grid computing / GridFTP / Cryptographic protocols / Secure copy / Secure Shell / File Transfer Protocol / Computing / Network architecture / Internet

Microsoft Word - Globus Online 2011.docx

Add to Reading List

Source URL: www.mcs.anl.gov

Language: English - Date: 2011-06-28 12:29:56
690Network architecture / StrongSwan / Internet Key Exchange / IPsec / FreeRADIUS / RADIUS / EAP-SIM / Virtual private network / Extensible Authentication Protocol / Cryptographic protocols / Computing / Data

Microsoft PowerPoint - LinuxTag2009_Flyer_VPN_Solution.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2009-06-21 15:09:29
UPDATE