Cryptographic protocols

Results: 3642



#Item
311HTTP / Cryptographic protocols / Internet standards / Secure communication / Email / MIME / Hypertext Transfer Protocol / HTTP Secure / Communications protocol / Computing / Data / Information

THE MITRE CORPORATION The TAXII HTTP Protocol Binding Specification Version 1.0 Mark Davidson, Charles Schmidt

Add to Reading List

Source URL: taxii.mitre.org

Language: English - Date: 2013-04-30 13:13:27
312Internet / Internet protocols / Network architecture / Internet standards / Cipher suite / Transport Layer Security / Telex / Proxy server / HTTP Secure / Cryptographic protocols / Secure communication / Computing

To appear in Proc. 20th Usenix Security Symposium (Usenix Security), AugustFor updates, source code, and an online demonstration, visit https://telex.cc. Telex: Anticensorship in the Network Infrastructure Eric Wu

Add to Reading List

Source URL: telex.cc

Language: English - Date: 2015-03-01 23:33:20
313Cryptographic protocols / Proof of knowledge / Non-interactive zero-knowledge proof / Interactive proof system / IP / Zero-knowledge proof / NP / Soundness / Oracle machine / Theoretical computer science / Cryptography / Computational complexity theory

BRICS Basic Research in Computer Science BRICS RSJ. Groth: Extracting Witnesses from Proofs of Knowledge Extracting Witnesses from Proofs of

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2002-01-04 07:13:38
314Data privacy / Differential privacy / Secure multi-party computation / Privacy / Internet privacy / Information privacy / Entropy / Secret sharing / Data mining / Cryptography / Cryptographic protocols / Formal sciences

Poster: Differentially Private Decision Tree Learning from Distributed Data Parisa Kaghazgaran Hassan Takabi

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:26
315Data / Network architecture / Tunneling protocols / Internet protocols / Internet Key Exchange / Virtual private networks / IPsec / Check Point / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Computer network security

Chapter 5 Advanced VPN Concepts and Tunnel Monitoring Solutions in this chapter:

Add to Reading List

Source URL: scitechconnect.elsevier.com

Language: English - Date: 2015-03-19 08:13:14
316Secure communication / Information / Data / Internet protocols / Electronic commerce / HTTP Secure / Electronic voting / JavaScript / X.509 / Cryptographic protocols / Public-key cryptography / Computing

The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election J. Alex Halderman1 and Vanessa Teague2? arXiv:1504.05646v2 [cs.CR] 5 Jun 2015

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-06-08 06:10:21
317Public-key cryptography / Secure channel / Commitment / Universal composability / Cryptography / Cryptographic protocols / Commitment scheme

BRICS Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: Universally Composable Commitments with Constant Expansion Factor Perfect Hiding and Perfect Binding

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-11-06 08:55:18
318Secure two-party computation / Pseudorandomness / Random oracle / Security parameter / Zero-knowledge proof / IP / Universal composability / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:37:56
319HTTP / Secure communication / Cryptographic protocols / Electronic commerce / Portable software / HTTP Secure / HTTP Strict Transport Security / Transport Layer Security / Man-in-the-middle attack / Software / Computing / Cryptography

Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning Yaoqi Jia∗ , Yue Chen‡ , Xinshu Dong† , Prateek Saxena∗ , Jian Mao‡ , Zhenkai Liang∗ ∗ Department of Computer Science,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:31
320RSA / ElGamal encryption / Diffie–Hellman key exchange / Homomorphic encryption / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptography / Public-key cryptography / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2013-02-05 01:02:43
UPDATE