Cryptographic protocol

Results: 1374



#Item
711Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Public-key cryptography / Cryptographic nonce / XTR / Deniable authentication / Security protocol notation / Wide Mouth Frog protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]The Logic of Authentication Protocols ?

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:09:46
712Cryptography / IEEE 802.11 / Computing / Technology / Wireless security / Wi-Fi Protected Access / Extensible Authentication Protocol / IEEE 802.11i-2004 / Wired Equivalent Privacy / Cryptographic protocols / Computer network security / Wireless networking

WiFi Protected Access (WPA) Overview - 9 Windows Platform Design Notes Design Information for the Microsoft® Windows® Family of Operating Systems WiFi Protected Access (WPA) Overview

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2005-07-07 14:59:26
713Key management / Group Domain of Interpretation / Diffie–Hellman key exchange / Perfect forward secrecy / XTR / Key distribution / Internet Security Association and Key Management Protocol / IPsec / Cryptography / Cryptographic protocols / Public-key cryptography

NRL Release Number[removed]Formalizing GDOI Group Key Management Requirements in NPATRL ∗

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:02:45
714Cryptographic protocols / Internet protocols / Internet standards / DigiNotar / Fox-IT / Certificate authority / Man-in-the-middle attack / Online Certificate Status Protocol / Revocation list / Cryptography / Public-key cryptography / Key management

Black Tulip Report of the investigation into the DigiNotar Certificate Authority breach Classification PUBLIC Customer Ministry of the Interior and Kingdom Relations

Add to Reading List

Source URL: www.rijksoverheid.nl

Language: English - Date: 2012-10-30 10:10:33
715Security / Internet protocols / Cryptographic protocols / Kerberos / Password authentication protocol / Mutual authentication / Integrated Windows Authentication / Authentication server / Security token / Computer network security / Computer security / Computing

LNCS[removed]Peer-to-Peer Authentication with a Distributed Single Sign-On Service

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-12 23:49:30
716Key management / Pharmaceutical industry / Validity / Validation / Public key certificate / X.509 / Verification and validation / Certificate authority / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

TrustWeaver AB TEST Signature Validation Policy 1. Identification This TEST Signature Validation Policy was issued by TrustWeaver AB under the unique identifier[removed][removed]For test purposes only! TrustWeav

Add to Reading List

Source URL: www.trustweaver.com

Language: English - Date: 2015-02-09 04:16:05
717Key management / Internet protocols / Public key certificate / X.509 / Digital signature / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

TrustWeaver AB DEVELOPMENT Signing Policy 1. Identification This DEVELOPMENT Signing Policy was issued by TrustWeaver AB under the unique identifier[removed][removed]For development and test purposes only! Trust

Add to Reading List

Source URL: www.trustweaver.com

Language: English - Date: 2015-02-09 04:16:05
718Cryptographic protocols / Secure communication / Networks / Load balancing / Network management / Routing / Multilayer switch / Application firewall / Transmission Control Protocol / Computing / Network architecture / Internet

BRIDGING THE GAP FOR APPLICATION DELIVERY. AV X D ATA S H E E T AVX10650 VIRTUALIZED APPLICATION DELIVERY CONTROLLER

Add to Reading List

Source URL: www.arraynetworks.com

Language: English - Date: 2015-01-29 16:19:31
719Internet protocols / Internet standards / Online Certificate Status Protocol / Revocation list / X.509 / Lightweight Directory Access Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

Using Dirmngr for version 1.0.2, 31 July 2008 Steffen Hansen ([removed]) Werner Koch ([removed])

Add to Reading List

Source URL: gnupg.org

Language: English - Date: 2008-07-31 08:03:50
720Computer-mediated communication / Spamming / Public-key cryptography / Cryptographic protocols / Spam filtering / Simple Mail Transfer Protocol / Email / Computing / Internet

Efficiency Improvements of the Private Message Service Oliver Berthold, Sebastian Clauß, Stefan K¨opsell, and Andreas Pfitzmann Technische Universit¨ at Dresden Institute for System Architecture

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2004-01-13 08:52:48
UPDATE