Cryptographic protocol

Results: 1374



#Item
761Radio-frequency identification / Wireless / Needham–Schroeder protocol / IP / Public-key cryptography / Cryptographic hash function / Cryptography / Cryptographic protocols / Automatic identification and data capture

A Light-weight Security Protocol for RFID System.

Add to Reading List

Source URL: dl.ifip.org

Language: English - Date: 2014-08-10 19:38:24
762Espionage / Cryptographic software / Steven Murdoch / Year of birth missing / Tor / Covert channel / Traffic analysis / Steganography / Internet protocol suite / Cryptography / Internet privacy / Computing

Covert channel vulnerabilities in anonymity systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-12-14 07:19:29
763Cryptographic protocols / Internet protocols / Internet standards / X.509 / Certificate server / Public key infrastructure / Self-signed certificate / Online Certificate Status Protocol / Revocation list / Cryptography / Public-key cryptography / Key management

Configuring Certificate Enrollment for a PKI This module describes the different methods available for certificate enrollment and how to set up each method for a participating PKI peer. Certificate enrollment, which is t

Add to Reading List

Source URL: www.cisco.com

Language: English
764Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.potaroo.net

Language: English - Date: 2007-11-04 03:24:11
765Network architecture / OSI protocols / Transmission Control Protocol / HTTP Secure / Traffic flow / Computing / Cryptographic protocols / Secure communication

THE COST OF THE “S” IN HTTPS David Naylor Peter Steenkiste Alessandro Finamore

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2014-12-03 06:11:22
766Internet Key Exchange / Diffie–Hellman key exchange / Elliptic curve cryptography / Hellman / Key size / Request for Comments / XTR / Oakley protocol / Cryptography / Cryptographic protocols / Finite fields

Internet Engineering Task Force (IETF) Request for Comments: 5903 Obsoletes: 4753 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-06-11 19:22:25
767Network architecture / Internet Key Exchange / IPsec / Extensible Authentication Protocol / Cisco IOS / Dynamic Multipoint Virtual Private Network / Cisco Systems / StrongSwan / Cryptographic protocols / Computing / Data

FlexVPN and Internet Key Exchange Version 2 Configuration Guide, Cisco IOS XE Release 3S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

Add to Reading List

Source URL: www.cisco.com

Language: English
768Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Distance-vector routing protocol / Hash chain / Cryptographic hash function / Path vector protocol / Enhanced Interior Gateway Routing Protocol / Interior gateway protocol / Routing protocols / Network architecture / Computing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: users.crhc.illinois.edu

Language: English - Date: 2003-02-20 14:25:57
769Cryptographic software / Trivial File Transfer Protocol / Configuration file / File system / Path / Filename / File Transfer Protocol / Filesystem Hierarchy Standard / Secure copy / Computing / Data / Information

A P P E N D I X 51 Working with the Cisco IOS File System, Configuration Files, and Software Images

Add to Reading List

Source URL: www.cisco.com

Language: English
770Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2007-08-26 21:30:00
UPDATE