Cryptographic protocol

Results: 1374



#Item
871Cryptographic protocols / Cryptographic software / SSH File Transfer Protocol / Secure Shell / WinSCP / Comparison of FTP client software / Folder / Software / Computing / System software

Microsoft Word - GDOT SFTP - User Guide for External Partners.docx

Add to Reading List

Source URL: www.dot.ga.gov

Language: English - Date: 2014-11-04 14:01:18
872United States Department of Defense / Cyberwarfare / National Security Agency / High Assurance Internet Protocol Encryptor / Computer network security / Military communications / TACLANE / MIL-STD-810 / United States Military Standard / Cryptography / Cryptographic protocols / United States government secrecy

General Dynamics Family of Network Encryptors Network Encryption Solutions for any Application Overview General Dynamics offers a full line of encryption solutions, providing users with choices to best fit their needs. W

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-11-29 04:06:44
873Cryptographic protocols / Internet protocols / Internet standards / Public key certificate / Certificate policy / Revocation list / X.509 / Certificate authority / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Key management

ECA DIGITAL CERTIFICATE PROGRAM

Add to Reading List

Source URL: secure.identrust.com

Language: English - Date: 2014-01-30 17:19:54
874Oblivious transfer / ElGamal encryption / Digital signature / Cipher / Alice and Bob / XTR / Cryptography / Public-key cryptography / Cryptographic protocols

A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-03 22:54:21
875Cryptographic protocols / Internet protocols / Internet standards / Certificate policy / X.509 / Revocation list / Public key certificate / Online Certificate Status Protocol / Certificate authority / Cryptography / Public-key cryptography / Key management

Microsoft Word - VPI_CP_011.final[removed]doc

Add to Reading List

Source URL: www.pki.vt.edu

Language: English - Date: 2006-10-05 16:40:21
876OSI protocols / Computing / Protocol / Communications protocol / CONS / Gonadotropin-releasing hormone / Data / Information / Cryptographic protocols

Microsoft Word - IRBMTG3_8_05.doc

Add to Reading List

Source URL: archive.hhs.gov

Language: English - Date: 2005-08-30 10:20:32
877Data / Computer architecture / Tunneling protocols / Internet privacy / Network architecture / Cisco PIX / Internet Security Association and Key Management Protocol / IPsec / Virtual private network / Computer network security / Cryptographic protocols / Computing

Configuration of VPN between Ingate Firewall and Cisco PIX Tested versions: Ingate Firewall[removed]Cisco PIX version 5.3(1), 3DES activated 1.

Add to Reading List

Source URL: www.ingate.com

Language: English - Date: 2003-03-06 10:30:43
878ComPsych / Cigna / Employee benefit / Computer network security / Extensible Authentication Protocol / Computing / Cryptographic protocols / Employment compensation / Occupational safety and health / Employee assistance program

Frequently Asked Questions Employee Assistance (EAP) and Work/Life Support Program with Cigna Behavioral Health Effective September 1, [removed]Phone number: [removed]Website: www.cignabehavioral.com employer

Add to Reading List

Source URL: www.bcps.org

Language: English - Date: 2013-08-22 17:25:44
879Data / Internet protocols / Cryptographic protocols / Computer network security / Extensible Authentication Protocol / IEEE 802.11r-2008 / RADIUS / Password authentication protocol / Authentication / Wireless networking / Computing / Technology

Using the EAP Framework for Fast Media Independent Handover Authentication∗ Antonio Izquierdo [removed] Katrin Hoeper [removed]

Add to Reading List

Source URL: w3.antd.nist.gov

Language: English - Date: 2009-02-17 16:52:39
880Man-in-the-middle attack / Public-key cryptography / Alice and Bob / Transmission Control Protocol / Computer / Affordance / World Wide Web / Cryptography / Human–computer interaction / Cryptographic protocols

Midterm LBSC 690 October 11, 2009 Name: |

Add to Reading List

Source URL: www.umiacs.umd.edu

Language: English - Date: 2014-07-09 22:19:39
UPDATE