Cryptographic protocols

Results: 3642



#Item
231Computing / Network architecture / Computer networking / Networking hardware / Internet protocols / Cryptographic protocols / 6WIND / Data Plane Development Kit / Open vSwitch / IPv6 / Network function virtualization / Virtual Router Redundancy Protocol

S P E E DS E R I E S TurboAppliances Ÿ Throughput for cost-effec ve rou ng and

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2015-12-18 16:04:59
232Wireless networking / Cryptographic protocols / Computer access control / Computer network security / Authentication protocol / Mutual authentication / Digest access authentication / Extensible Authentication Protocol / Authentication / Man-in-the-middle attack

Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

Add to Reading List

Source URL: asokan.org

Language: English - Date: 2015-04-08 16:31:41
233

Automatic Verification of Cryptographic Protocols in the Formal Model Automatic Verifier ProVerif Bruno Blanchet ´ CNRS, Ecole

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-10-01 07:25:57
    234Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Virtual private networks / Computer network security / Cryptographic software / StrongSwan / Internet Key Exchange / FreeS/WAN / Openswan

    LinuxTag 2010 Berlin strongSwan News Prof. Dr. Andreas Steffen Martin Willi

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2010-06-11 06:38:12
    235

    Introduction to cryptographic protocols

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2013-09-02 11:47:42
      236

      Formal verification of quantum cryptography Dominique Unruh University of Tartu Abstract. Formal verification of cryptographic protocols has been an active research area for several decades, mostly in idealized symbolic

      Add to Reading List

      Source URL: software.imdea.org

      - Date: 2015-07-09 06:40:16
        237

        A Computationally Sound Mechanized Prover for Cryptographic Protocols Bruno Blanchet ´ cole Normale Sup´ CNRS, E erieure, Paris

        Add to Reading List

        Source URL: prosecco.gforge.inria.fr

        Language: English - Date: 2012-10-01 07:25:51
          238IPsec / Cryptographic protocols / Virtual private networks / Computer network security / Cryptographic software / StrongSwan / Internet Key Exchange / FreeS/WAN / OpenWrt / Openswan / IPv6 / Raspberry Pi

          Die strongSwan Open Source VPN Lösung Open Source Trend Days 2013 Steinfurt www.strongswan.org

          Add to Reading List

          Source URL: www.strongswan.org

          Language: English - Date: 2013-09-25 06:25:19
          239

          CryptoVerif: A Computationally Sound Mechanized Prover for Cryptographic Protocols Bruno Blanchet ´ CNRS, Ecole

          Add to Reading List

          Source URL: prosecco.gforge.inria.fr

          Language: English - Date: 2012-10-01 07:25:53
            240Computer security / Computing / Cryptography / Computer network security / Trusted computing / IPsec / Cryptographic software / Cryptographic protocols / StrongSwan / Trusted Network Connect / IF-MAP / Internet Key Exchange

            The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

            Add to Reading List

            Source URL: www.strongswan.org

            Language: English - Date: 2012-08-29 15:32:53
            UPDATE