Cryptographic protocol

Results: 1374



#Item
771Computer network security / Wireless networking / Cryptographic protocols / Extensible Authentication Protocol

Vol[removed]Number 11 - Energizer

Add to Reading List

Source URL: www.mn.gov

Language: English - Date: 2014-01-14 09:33:38
772Computer network security / Cryptographic protocols / Technology / Extensible Authentication Protocol / Wireless security / Computing / Internet / Email

Vol. 2015, Number 6 November 19, 2014 Topics in this issue

Add to Reading List

Source URL: www.mn.gov

Language: English - Date: 2014-11-20 10:29:24
773Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Distance-vector routing protocol / Hash chain / Cryptographic hash function / Path vector protocol / Enhanced Interior Gateway Routing Protocol / Interior gateway protocol / Routing protocols / Network architecture / Computing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: monarch.cs.rice.edu

Language: English - Date: 2003-02-20 14:25:57
774Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: monarch.cs.rice.edu

Language: English - Date: 2002-11-20 04:48:07
775Homomorphic encryption / Oblivious transfer / Paillier cryptosystem / Naccache–Stern cryptosystem / Commitment scheme / ElGamal encryption / Transmission Control Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

Verifiable Homomorphic Oblivious Transfer and Private Equality Test Helger Lipmaa Laboratory for Theoretical CS, Department of CS&E Helsinki University of Technology, P.O.Box 5400, FIN[removed]HUT, Espoo, Finland helger@tc

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
776Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.monarch.cs.rice.edu

Language: English - Date: 2002-11-20 04:48:07
777Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Distance-vector routing protocol / Hash chain / Cryptographic hash function / Path vector protocol / Enhanced Interior Gateway Routing Protocol / Interior gateway protocol / Routing protocols / Network architecture / Computing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.monarch.cs.rice.edu

Language: English - Date: 2003-02-20 14:25:57
778Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2003-04-07 16:01:07
779Computing / Secure communication / Security / Electronic commerce / Internet / Cisco Unified Communications Manager / HTTP Secure / Transport Layer Security / X.509 / Public-key cryptography / Cryptographic protocols / Key management

C H A P T E R 2 Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Add to Reading List

Source URL: www.cisco.com

Language: English
780Computer network security / Cryptographic protocols / Internet privacy / Internet protocols / IPsec / Dynamic Host Configuration Protocol / Virtual private network / Cisco IOS / IP address / Network architecture / Computing / Computer architecture

Sample Cisco ASA to Digi Connect / ConnectPort VPN Config pg 1 Digi Connect® WAN Application Guide: Configure a VPN between

Add to Reading List

Source URL: ftp1.digi.com

Language: English - Date: 2008-09-17 17:50:12
UPDATE