Cryptographic protocol

Results: 1374



#Item
731Network architecture / Internet protocols / Cryptographic software / FTP / Internet standards / Secure Shell / Email client / File Transfer Protocol / Port / Computing / Internet / Email

Compressed TCP/IP−Sessions using SSH−like tools Compressed TCP/IP−Sessions using SSH−like tools Table of Contents Compressed TCP/IP−Sessions using SSH−like tools.............................................

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-12-14 11:52:46
732IP / Mathematics / NP / Valuation / Zero-knowledge proof / Cryptographic protocols / Applied mathematics / Proof of knowledge

Verifiable Mixing (Shuffling) of ElGamal Pairs C. Andrew Neff∗ April 21, 2004† Abstract We give an improved presentation of the protocol first published

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-04-21 22:18:47
733OpenSSL / System software / Secure Remote Password protocol / GNU General Public License / Free software / Copyright / Comparison of TLS Implementations / Crypto++ / Cryptographic software / Cryptography / Software

crypto Copyright © [removed]Ericsson AB. All Rights Reserved. crypto 3.0 June 17, 2013 Copyright © [removed]Ericsson AB. All Rights Reserved.

Add to Reading List

Source URL: www.erlang.org

Language: English
734Public-key cryptography / Message authentication code / Key-agreement protocol / Key / Public key infrastructure / AKA / Symmetric-key algorithm / Cryptographic key types / Internet security / Cryptography / Cryptographic protocols / Key management

Microsoft Word - D200 2-Updated22Jan2010.doc

Add to Reading List

Source URL: www.foi.se

Language: English - Date: 2012-06-18 09:13:05
735Auction / First-price sealed-bid auction / Vickrey auction / English auction / Dutch auction / Reverse auction / Double auction / Combinatorial auction / Cryptographic protocol / Auctioneering / Auction theory / Business

Auctions∗ Felix Brandt October 1, 2009 1

Add to Reading List

Source URL: dss.in.tum.de

Language: English - Date: 2010-10-13 06:03:56
736Universal composability / Communications protocol / Secure multi-party computation / IP / Port / Proof of knowledge / Zero-knowledge proof / Commitment scheme / X Window System / Cryptography / Cryptographic protocols / Data

Efficient and Universally Composable Committed Oblivious Transfer and Applications∗ Juan A. Garay† Philip MacKenzie†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-02-22 16:48:33
737Computer network security / IEEE 802.11 / Computing / Technology / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / Temporal Key Integrity Protocol / Wired Equivalent Privacy / Cryptography / Wireless networking / Cryptographic protocols

Wireless Security’s Future Bruce Potter Cigital, Inc[removed]Ridgetop Circle Suite 400

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
738Grid computing / Cryptographic software / Secure Shell / SSHFS / Comparison of SSH servers / Oracle Grid Engine / ExpanDrive / File Transfer Protocol / National Grid Service / Computing / Software / System software

Building simple, easy-to-use Grids with Styx Grid Services and SSH Jon Blower∗ , Keith Haines Reading e-Science Centre, Environmental Systems Science Centre, University of Reading, Harry Pitt Building, University of Re

Add to Reading List

Source URL: www.resc.rdg.ac.uk

Language: English - Date: 2006-07-27 06:50:18
739Universal composability / Zero-knowledge proof / Communications protocol / Protocol / Proof of knowledge / Cryptographic protocols / Data / Information

POLLING WITH PHYSICAL ENVELOPES: A RIGOROUS ANALYSIS OF A HUMAN-CENTRIC PROTOCOL∗ TAL MORAN† AND MONI NAOR‡ Abstract. We propose simple, realistic protocols for polling that allow the responder to plausibly repudia

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2006-06-14 09:27:06
740Cryptographic protocols / X.509 / Public key certificate / Certificate authority / Root certificate / IPhone / HTTP Secure / Simple Certificate Enrollment Protocol / IOS / Cryptography / Public-key cryptography / Key management

Deploying iPhone and iPad Digital Certificates iOS supports digital certificates, giving business users secure, streamlined access to corporate services. A digital certificate is composed of a public key, information abo

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2013-09-30 04:06:00
UPDATE