Cryptographic protocols

Results: 3642



#Item
271Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
272Transport Layer Security / Cryptographic protocols / Cryptographic software / Secure communication / Internet security / OpenSSL / Heartbleed / Comparison of TLS implementations / Mbed TLS / Cipher suite / HTTPS / POODLE

Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementation David Kaloper-Merˇsinjak† , Hannes Mehnert† , Anil Madhavapeddy and Peter Sewell University of Cambridge Comput

Add to Reading List

Source URL: anil.recoil.org

Language: English - Date: 2015-07-05 12:54:07
273

Registration Form Summer School on Applied Cryptographic Protocols 2010 Mykonos, Greece, Sep 26 – Oct 01, 2010 Please provide the requested information below to register for the summer school. Note that registration do

Add to Reading List

Source URL: summerschool2010.cased.de

Language: English - Date: 2010-05-03 10:59:06
    274Cryptographic protocols / Public-key cryptography / Notary / Online chat / Internet protocols / Deniable authentication / XMPP / Off-the-Record Messaging / Authentication / Digital signature / Key exchange / Transport Layer Security

    Improved Group Off-the-Record Messaging Hong Liu Eugene Y. Vasserman Nicholas Hopper

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2013-09-04 15:59:08
    275Computing / Internet / Software / Internet privacy / Computer networking / Internet protocols / Network performance / Proxy server / Reverse proxy / Transport Layer Security / Cryptographic hash function / Load balancing

    Validating Web Content with Senser Jordan Wilberding Georgetown University Andrew Yates Georgetown University

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2013-10-29 13:52:26
    276Key management / Public-key cryptography / Public key infrastructure / Transport Layer Security / Cryptographic protocols / Certificate policy / Revocation list / Public key certificate / Certification Practice Statement / Certificate authority / X.509 / S/MIME

    ,1)1&$ &HUWLILFDWH3ROLF\DQG &HUWLILFDWLRQ3UDFWLFH 6WDWHPHQW Version 0.3 (DRAFT)

    Add to Reading List

    Source URL: security.fi.infn.it

    Language: English - Date: 2011-04-08 05:46:20
    277Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

    Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:36:15
    278

    G2C: Cryptographic Protocols From Goal-Driven Specifications Michael Backes1,2 , Matteo Maffei1 , Kim Pecina1 , and Raphael M. Reischuk1 1 2

    Add to Reading List

    Source URL: sps.cs.uni-saarland.de

    Language: English - Date: 2013-10-09 19:06:18
      UPDATE