Cryptographic protocols

Results: 3642



#Item
261Internet privacy / Secure communication / Computer networking / Cryptographic protocols / Transport Layer Security / Proxy server / Transmission Control Protocol / HTTPS / Internet protocol suite / Session Initiation Protocol

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2016-01-05 05:04:04
262

Real-life Cryptographic Protocols and Standardization --How to become a good cook-Kazue Sako 佐古 和恵

Add to Reading List

Source URL: cis.sjtu.edu.cn

Language: English - Date: 2013-02-09 07:52:03
    263Secure communication / Internet Standards / Cryptographic protocols / Cryptographic software / Transport Layer Security / Handshaking / FTPS / SSL acceleration

    DIMACS Security & Cryptography Crash Course – day 4 Internet Cryptography Tools, Part I: TLS/SSL Prof. Amir Herzberg

    Add to Reading List

    Source URL: dimacs.rutgers.edu

    Language: English - Date: 2003-07-30 14:06:03
    264Economy / E-commerce / Business / Financial services / Payment systems / Identity management / Financial cryptography / Cryptographic protocols / Oyster card / Smart card / Internet privacy / Online shopping

    P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems Andy Rupp1 , Gesine Hinterw¨alder2 , Foteini Baldimtsi3 , and Christof Paar4 1 2

    Add to Reading List

    Source URL: fc13.ifca.ai

    Language: English - Date: 2013-03-27 20:41:00
    265Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

    Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:38:44
    266Cryptographic protocols / Secure communication / Internet protocols / Transport Layer Security / Network protocols / Transmission Control Protocol / HTTPS / Ciphertext indistinguishability / Initialization vector / Hypertext Transfer Protocol / Block cipher mode of operation / Keystream

    This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

    Add to Reading List

    Source URL: jhalderm.com

    Language: English - Date: 2015-11-02 11:01:00
    267Cryptography / Cryptographic protocols / Public-key cryptography / Internet protocols / DiffieHellman key exchange / NeedhamSchroeder protocol / Communications protocol / Key exchange / Protocol composition logic / Interlock protocol

    Journal of Computer Security–482 IOS Press 423 A derivation system and compositional logic

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:12
    268Secure communication / Cryptographic protocols / Cryptographic software / Public-key cryptography / Internet Standards / Cipher suite / X.509 / Netscape / Transport Layer Security

    SSL: Paved With Good Intentions

    Add to Reading List

    Source URL: www.westpoint.ltd.uk

    Language: English - Date: 2015-10-01 10:06:33
    269Cryptography / Protocol composition logic / Authentication protocols / BurrowsAbadiNeedham logic / Communications protocol / Kerberos / Public-key cryptography / Cryptographic protocol

    A. Datta et al. / Protocol Composition Logic 1 Protocol Composition Logic Anupam DATTA a , John C. MITCHELL b , Arnab ROY b and

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:08
    270Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

    Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:15
    UPDATE