Cryptographic protocols

Results: 3642



#Item
241

Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols Morten Dahl2 , Naoki Kobayashi1 , Yunde Sun1 , and Hans H¨uttel2 1 2

Add to Reading List

Source URL: www-kb.is.s.u-tokyo.ac.jp

Language: English - Date: 2014-01-15 04:21:44
    242Computing / Network architecture / Internet protocols / Tunneling protocols / Cryptographic protocols / Computer networking / Networking hardware / 6WIND / Data Plane Development Kit / IPsec / Open vSwitch / Internet Key Exchange

    Powering The New Generation Of IPsec Gateways

    Add to Reading List

    Source URL: www.6wind.com

    Language: English - Date: 2014-07-22 11:54:51
    243Cryptography / Transport Layer Security / Cryptographic protocols / Cryptographic software / Internet protocols / Secure communication / Padding oracle attack / Block cipher mode of operation / Padding / Authenticated encryption / OpenSSL / CRIME

    Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English - Date: 2016-01-19 07:39:30
    244Computing / Internet / Internet privacy / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / Computer access control / HTTP cookie / Proxy server / Transport Layer Security / Email

    REEF FAMILY OF COMPANIES WEBSITE PRIVACY POLICY Visitors to the Reef Family of Companies website are not required to provide any personal information. However, to use certain features on this site, you may be asked to pr

    Add to Reading List

    Source URL: www.reefogc.com

    Language: English - Date: 2010-08-20 15:18:56
    245Computing / Software / Hypertext Transfer Protocol / Internet privacy / Cryptographic protocols / Secure communication / Cross-site request forgery / Computer access control / HTTP cookie / Same-origin policy / Basic access authentication / JavaScript

    Lightweight Server Support for Browser-Based CSRF Protection Alexei Czeskis University of Washington Alexander Moshchuk

    Add to Reading List

    Source URL: www2013.wwwconference.org

    Language: English - Date: 2014-07-21 08:47:06
    246Cryptography / Cryptographic software / Secure communication / Cryptographic protocols / Transport Layer Security / Public-key cryptography / Cipher suite / OpenSSL / HTTPS / Comparison of TLS implementations / Client certificate / WolfSSL

    Prying open Pandora’s box: KCI attacks against TLS Clemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes RISE – Research Industrial Systems Engineering GmbH {clemens.hlauschek, markus.gruber, flori

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
    247

    ARA SSIA FormaCryptTwo models for the verification of cryptographic protocols: computational model formal, “Dolev-Yao” model enc(M,k

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2012-10-01 07:25:48
      248Computing / Cryptography / Network architecture / Cryptographic protocols / Computer network security / IPsec / Internet protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Online Certificate Status Protocol

      Microsoft PowerPoint - LinuxTag2008_Flyer_VPN_Solution.ppt

      Add to Reading List

      Source URL: www.strongswan.org

      Language: English - Date: 2008-06-25 02:51:57
      249

      CryptoVerif: A Computationally Sound Mechanized Prover for Cryptographic Protocols Bruno Blanchet ´ CNRS, Ecole

      Add to Reading List

      Source URL: prosecco.gforge.inria.fr

      Language: English - Date: 2012-10-01 07:25:57
        250Cryptography / Transport Layer Security / Public key infrastructure / Key management / Public-key cryptography / Cryptographic protocols / Certificate authority / HTTPS / Public key certificate / X.509 / Root certificate / Extended Validation Certificate

        Here’s My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web Devdatta Akhawe Bernhard Amann

        Add to Reading List

        Source URL: www2013.wwwconference.org

        Language: English - Date: 2014-07-21 08:47:06
        UPDATE