Cryptographic protocol

Results: 1374



#Item
701Information / Dolev-Yao model / Public-key cryptography / Communications protocol / Needham–Schroeder protocol / Transmission Control Protocol / Smart card / Email / Cryptographic protocols / Cryptography / Data

¨t Augsburg Universita Verifying Smart Card Applications: An ASM Approach. D.Haneberg, H.Grandy, W.Reif, G.Schellhorn

Add to Reading List

Source URL: www.isse.uni-augsburg.de

Language: English - Date: 2014-12-01 09:19:28
702Cryptographic protocols / Secure communication / Open standards / Cross-platform software / Extensible Messaging and Presence Protocol / Online chat / Transport Layer Security / XMPP Standards Foundation / Jabberd14 / Computing / Data / Information

XEP-0238: XMPP Protocol Flows for Inter-Domain Federation Peter Saint-Andre mailto:[removed] xmpp:[removed] https://stpeter.im[removed]

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 13:22:49
703National security / Computing / Public safety / Inter-process communication / Virtual synchrony / Key management / Computer security / Diffie–Hellman key exchange / Key-agreement protocol / Cryptographic protocols / Security / Crime prevention

High-Performance Secure Group Communication by Cristina Nita-Rotaru

Add to Reading List

Source URL: www.dsn.jhu.edu

Language: English - Date: 2013-09-20 16:47:28
704Communications protocol / Data transmission / Protocols / E / Cryptographic protocol / Verification / Systems science / Systems engineering / Data / Information

Agricultural BMP Verification Protocols for Best Management Practices Frank J. Coale Mark P. Dubin Chesapeake Bay Program Partnership’s

Add to Reading List

Source URL: www.chesapeakebay.net

Language: English - Date: 2013-02-25 08:58:25
705Internet protocols / Internet standards / Cryptography standards / XKMS / X.509 / Delegated Path Discovery / Lightweight Directory Access Protocol / PKCS / Authentication / Cryptography / Cryptographic protocols / Public-key cryptography

7 May 7, 2003 Comments from Denis Pinkas ([removed]) on XKMS Version 2 (April 18, 2003)

Add to Reading List

Source URL: lists.w3.org

Language: English - Date: 2015-01-11 00:16:59
706Information / Communications protocol / Burrows–Abadi–Needham logic / Key-agreement protocol / Authentication protocol / Dolev-Yao model / Protocol / Public-key cryptography / Station-to-Station protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis Catherine Meadows

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-26 15:14:05
707Cables / Electricity / Voltage drop / Communications protocol / Rich Text Format / Protocol / X Window System / International performance measurement and verification protocol / Cryptographic protocol / Software / Computing / Data

Regional Technical Forum Automated Conservation Voltage Reduction Protocol #1 Meeting Agenda and Notes: December 12, 2012, 2:04 pm – 4:20

Add to Reading List

Source URL: rtf.nwcouncil.org

Language: English - Date: 2013-01-08 15:10:21
708Data / Cryptographic protocols / Secure communication / Computer network security / Transport Layer Security / Transmission Control Protocol / IPsec / Transport layer / Man-in-the-middle attack / Computing / Internet protocols / Network architecture

NETWORK SECURITY EE122 Section 12 QUESTION 1 ABRUPT TERMINATION!

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2013-12-10 23:52:15
709Information / Challenge-response authentication / Password authentication protocol / Public-key cryptography / Cryptographic nonce / Needham–Schroeder protocol / Otway–Rees protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]Environmental Requirements for Authentication Protocols Ran Canetti1 and Catherine Meadows2 and Paul Syverson2 1

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 10:13:46
710OpenSSL / System software / Secure Remote Password protocol / GNU General Public License / Free software / Copyright / Comparison of TLS Implementations / Crypto++ / Cryptographic software / Cryptography / Software

crypto Copyright © [removed]Ericsson AB. All Rights Reserved. crypto[removed]December 9, 2014 Copyright © [removed]Ericsson AB. All Rights Reserved.

Add to Reading List

Source URL: erlang.org

Language: English - Date: 2014-12-11 06:30:14
UPDATE