Cryptographic protocol

Results: 1374



#Item
741Videotelephony / Universal Mobile Telecommunications System / Cryptographic protocols / IP Multimedia Subsystem / Multimedia / Session Initiation Protocol / 3GPP / AKA / Digest access authentication / Technology / Electronic engineering / Mobile technology

TS[removed]V12[removed]Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and S

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-02-05 10:14:26
742Network architecture / Network performance / Cryptographic software / Tor / Onion routing / Network congestion / Proxy server / Denial-of-service attack / Transmission Control Protocol / Internet privacy / Computing / Internet

A Practical Congestion Attack on Tor Using Long Paths Nathan S. Evans Colorado Research Institute for Security and Privacy University of Denver Email: [removed]

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2009-06-15 12:24:42
743Computer network security / Directory services / Internet protocols / Internet standards / Cryptographic protocols / MongoDB / Lightweight Directory Access Protocol / Kerberos / Transport Layer Security / Computing / Data / Information

MongoDB databases at risk – Several thousand MongoDBs without access control on the Internet Jens Heyens, Kai Greshake, Eric Petryka January 2015

Add to Reading List

Source URL: cispa.saarland

Language: English - Date: 2015-02-10 13:33:22
744Standards organizations / Email / Cryptographic protocols / Internet standards / Lawful interception / Privacy of telecommunications / European Telecommunications Standards Institute / Simple Mail Transfer Protocol / Session Initiation Protocol / Computing / Internet / Telephony

TS[removed]V3[removed]Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-10-28 05:44:29
745Cryptographic protocols / Internet protocols / Internet standards / Revocation list / Online Certificate Status Protocol / X.509 / SCVP / Public key certificate / Certificate authority / Cryptography / Public-key cryptography / Key management

The Certificate Revocation Framework O. Kessler, Open Systems AG http://www.open.ch March 2000

Add to Reading List

Source URL: www.ncode.ch

Language: English - Date: 2010-07-15 10:28:11
746Ubiquitous computing / Abstract state machines / Java Card / Espionage / Cryptographic protocol / Augsburg / Cryptography / Subscriber identity module / Security / Smart cards / Computing / ISO standards

SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications Nina Moebius, Kurt Stenzel, Holger Grandy, Wolfgang Reif

Add to Reading List

Source URL: www.isse.uni-augsburg.de

Language: English - Date: 2015-02-06 05:20:03
747Electronics / Videotelephony / Network architecture / Internet protocols / Session Initiation Protocol / ZRTP / Next-generation network / Real-time Transport Protocol / IP Multimedia Subsystem / Computing / Cryptographic protocols / Electronic engineering

Final draft TR/NGCN – Security of session-based communications

Add to Reading List

Source URL: www.ecma-international.org

Language: English - Date: 2014-10-28 04:11:43
748Crime prevention / National security / Ueli Maurer / Outline of cryptography / Information security / Key-agreement protocol / Elliptic curve cryptography / ETH Zurich / Digital signature / Cryptography / Cryptographic protocols / Computer security

Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland

Add to Reading List

Source URL: www.infsec.ch

Language: English - Date: 2014-11-20 07:42:12
749Internet Protocol / IPv6 / Internet protocols / Computer network security / IPsec / Virtual private network / X.509 / IPv6 deployment / Security and safety features new to Windows Vista / Network architecture / Computing / Cryptographic protocols

Presented by Jordi Palet [removed] Consulintel University of Murcia (Spain) 

Add to Reading List

Source URL: www.ec.ipv6tf.org

Language: English - Date: 2007-05-21 02:26:16
750Internet standards / HTTP / URI schemes / Internet protocols / Cryptographic protocols / HTTP pipelining / Hypertext Transfer Protocol / File Transfer Protocol / Transmission Control Protocol / Computing / Internet / Network architecture

http2 Background, the protocol, the implementations and the future http.//daniel.haxx.se/http2/ by Daniel Stenberg

Add to Reading List

Source URL: daniel.haxx.se

Language: English - Date: 2015-01-15 06:55:04
UPDATE