Cryptographic protocol

Results: 1374



#Item
781Cryptographic protocols / Computer network security / Internet privacy / Tunneling protocols / IPsec / Virtual private network / Cisco PIX / Internet Security Association and Key Management Protocol / IP address / Computing / Network architecture / Computer architecture

Sample Cisco PIX to Digi Connect / ConnectPort VPN Config pg 3 Digi Connect® WAN Application Guide: Configure a VPN between

Add to Reading List

Source URL: ftp1.digi.com

Language: English - Date: 2008-09-17 16:28:23
782Information / Wireless networking / Internet protocols / Cryptographic protocols / Extensible Authentication Protocol / RADIUS / IEEE 802.1X / TACACS / Authentication protocol / Computing / Computer network security / Data

CH A P T E R 4 Common Scenarios Using ACS Network control refers to the process of controlling access to a network. Traditionally a username and

Add to Reading List

Source URL: www.cisco.com

Language: English
783Wireless networking / Computer network security / Temporal Key Integrity Protocol / Wi-Fi Protected Access / Transmission Control Protocol / Initialization vector / Wired Equivalent Privacy / Man-in-the-middle attack / Stream cipher / Cryptography / Cryptographic protocols / IEEE 802.11

A Practical Message Falsification Attack on WPA Toshihiro Ohigashi1 and Masakatu Morii2 1 Hiroshima University, 1–4–2 Kagamiyama, Higashi-Hiroshima, 739–8511 Japan

Add to Reading List

Source URL: jwis2009.nsysu.edu.tw

Language: English - Date: 2014-07-04 02:33:26
784Cryptographic protocols / Internet / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / HTTP Strict Transport Security / Session hijacking / SSL acceleration / Cryptography / Secure communication / Computing

SSL Server Rating Guide version 2009i (8 December[removed]Copyright © [removed]Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication. We feel

Add to Reading List

Source URL: www.ssllabs.com

Language: English - Date: 2015-01-19 14:14:14
785Internet / Cryptographic protocols / Internet protocols / Email / Internet privacy / Transport Layer Security / Simple Mail Transfer Protocol / Information security / Cryptography / Security / Secure communication / Computing

Whitepaper of the SGRP Special Interest Group "Secure Information eXchange (SIX)"

Add to Reading List

Source URL: www.sgrp.ch

Language: English - Date: 2011-06-28 13:36:53
786Learning with errors / Machine learning / Diffie–Hellman key exchange / Transport Layer Security / XTR / Transmission Control Protocol / Onion routing / RSA / Cryptography / Cryptographic protocols / Electronic commerce

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-06 03:15:24
787Information / Internet protocols / Password-authenticated key agreement / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions ? Jan Camenisch1 , Robert R. Enderlein1,2 , and Gregory Neven1 {jca,enr,nev}@zurich.ibm.com 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-05 05:22:56
788Tunneling protocols / Data / Internet protocols / Computer network security / Virtual private networks / IPsec / Internet Key Exchange / Layer 2 Tunneling Protocol / Internet security / Cryptographic protocols / Computing / Network architecture

Microsoft Word - CSG-01_G_english.DOC

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-25 12:12:19
789Cyberwarfare / NTLM / Integrated Windows Authentication / Server Message Block / LAN Manager / Cryptographic nonce / Authentication protocol / Challenge-response authentication / Windows / Computing / Computer security / Computer network security

Understanding the Windows SMB NTLM Authentication Weak Nonce Vulnerability Hernan Ochoa

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:52:55
790System software / Internet privacy / TCP/IP / Cryptographic software / Tor / TCP congestion avoidance algorithm / Transmission Control Protocol / Network congestion / Scheduling / Computing / Software / Network performance

Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport Rob Jansen† Chris Wacek∗

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2014-12-31 10:56:18
UPDATE