Cryptographic protocols

Results: 3642



#Item
221Cryptographic software / Secure Shell / Internet Standards / Internet protocols / Cross-platform software / Nmap / OpenSSH / Hping / Telnet / Comparison of SSH clients / File Transfer Protocol / Transmission Control Protocol

Fotis Hantzis Website Email sock-raw.org

Add to Reading List

Source URL: sock-raw.org

Language: English - Date: 2015-10-18 14:42:59
222Computing / Cryptography / Computer network security / Network architecture / IPsec / Cryptographic protocols / Virtual private networks / Tunneling protocols / StrongSwan / Internet Key Exchange

VPN with Mobile Devices revisited 55. DFN Betriebstagung Oktober 2011 Berlin Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications HSR Hochschule für Technik Rapperswil

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2011-10-24 00:14:43
223Computer network security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol / AuthIP

Microsoft PowerPoint - LinuxTag2009_Flyer_VPN_Solution.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2009-06-21 15:09:29
224Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size / Safe prime

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-10-15 14:53:20
225Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / Cipher suite

1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2014-02-27 10:40:02
226Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / Cryptographic protocols / Certificate authority / Public key certificate / Certificate policy / X.509 / DigiCert / Revocation list

Microsoft Word - DigiCert_CP_v409.doc

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2016-03-04 15:15:05
227Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / Internet Key Exchange / StrongSwan / Opportunistic encryption / NAT traversal

strongSwan The new IKEv2 VPN Solution Andreas Steffen Copyright © 2007 by Andreas Steffen

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2007-05-26 10:12:50
228Secure communication / Cryptographic protocols / Internet Standards / Computer network security / Transport Layer Security / HTTPS / OpenSSL / Cipher suite / Handshaking / End-to-end encryption / Middlebox / Extensible Authentication Protocol

Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-07-29 16:55:02
229Cryptography / Public-key cryptography / Key management / Internet protocols / Internet Standards / Cryptographic protocols / Named data networking / Authentication / Domain Name System Security Extensions / Key / Unique key / Transport Layer Security

Schematizing Trust in Named Data Networking Yingdi Yu Alexander Afanasyev UCLA

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:18:57
230

FORMAL VERIFICATION OF CRYPTOGRAPHIC PROTOCOLS WITH AUTOMATED REASONING by BEN SMYTH

Add to Reading List

Source URL: www.bensmyth.com

Language: English - Date: 2012-05-24 07:24:41
    UPDATE