Cryptographic protocol

Results: 1374



#Item
751Dolev-Yao model / Communications protocol / Computer security / Cryptographic primitive / Information-theoretic security / Cryptography / Cryptographic protocols / Secure multi-party computation

ZISC annual report[removed]

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 14:43:29
752Cryptographic protocols / Internet protocols / Internet standards / Public key infrastructure / X.509 / Public key certificate / Online Certificate Status Protocol / Security token / Certificate authority / Cryptography / Public-key cryptography / Key management

the key role in digital certificate deployment PKI infrastructure at the service of public and private sector "We have significantly valued the charismathics agnostic PKI middleware platform through which we can leverage

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2010-10-11 12:50:19
753Technology / Wireless networking / Computer network security / Electronic engineering / Internet Protocol / Extensible Authentication Protocol / EAP-SIM / Wi-Fi Alliance / IEEE 802.11u / Wi-Fi / Cryptographic protocols / Computing

White Paper Architecture for Mobile Data Offload over Wi-Fi Access Networks Introduction Mobile network traffic is growing exponentially, and service providers must manage their networks efficiently to

Add to Reading List

Source URL: www.cisco.com

Language: English
754Computing / Cryptography / Communications protocol / Adversary model / Cryptographic nonce / Turing machine / Memory / Bounded set / Cryptographic protocols / Data / Information

Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de

Add to Reading List

Source URL: bib.irb.hr

Language: English - Date: 2014-08-21 13:21:17
755Numerical linear algebra / Matrix theory / Matrices / Cryptographic protocols / Communication complexity / Gaussian elimination / Rank / Matrix / Invertible matrix / Algebra / Mathematics / Linear algebra

Communication Efficient Secure Linear Algebra Kobbi Nissim? and Enav Weinreb?? Ben Gurion University, Beer-Sheva 84105, Israel. {kobbi, weinrebe}@cs.bgu.ac.il Abstract. We present communication efficient secure protocol

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
756Otway–Rees protocol / Sense / Biology / Needham–Schroeder protocol / Homomorphism

Searching for Shapes in Cryptographic Protocols (extended version)? Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer The MITRE Corporation Abstract. We describe a method for enumerating all essentially differe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-02-02 08:32:07
757Secure two-party computation / Communications protocol / Secret sharing / Transmission Control Protocol / Information-theoretic security / IP / Computational complexity theory / Zero-knowledge proof / PP / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen∗ Ivan Bjerre Damg˚ ard† Yuval Ishai‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-08-07 04:07:04
758Network architecture / Internet standards / Internet protocols / Secure communication / HTTP / TLS-SRP / HTTP Secure / Post Office Protocol / File Transfer Protocol / Cryptographic protocols / Internet / Computing

HTTP Mutual authentication protocol proposal

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2009-03-25 21:32:52
759Internet privacy / Internet protocols / Cryptographic protocols / Dynamic Multipoint Virtual Private Network / Network protocols / Next Hop Resolution Protocol / IPv6 / IP address / Cisco IOS / Network architecture / Computing / Computer architecture

Configuring FlexVPN Spoke to Spoke Last Published Date: March 28, 2014 The FlexVPN Spoke to Spoke feature enables a FlexVPN client to establish a direct crypto tunnel with another FlexVPN client leveraging virtual tunnel

Add to Reading List

Source URL: www.cisco.com

Language: English
760Computing / Tunneling protocols / Internet protocols / IPsec / Network protocols / Internet Security Association and Key Management Protocol / Mobile IP / Security association / Network layer / Cryptographic protocols / Data / Network architecture

Mobile Multi-Layered IPsec Heesook Choi, Hui Song, Guohong Cao, and Tom La Porta Department of Computer Science & Engineering The Pennsylvania State University University Park, PA[removed]Email: {hchoi,hsong,gcao,tlp}@cse.

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2005-01-06 12:57:28
UPDATE