Cryptographic protocols

Results: 3642



#Item
321Cryptographic protocols / Bitcoin / Peer-to-peer computing / Secure multi-party computation / Commitment scheme / Zero-knowledge proof / X Window System / PP / Homomorphic encryption / Cryptography / Software / Computing

How to Use Bitcoin to Incentivize Correct Computations Ranjit Kumaresan and Iddo Bentov Technion, Haifa, Israel {ranjit | idddo }@cs.technion.ac.il

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-09-01 09:06:37
322Cryptographic protocols / Data / Wireless networking / Computer network security / Advanced Encryption Standard / ZigBee / IPsec / Block cipher modes of operation / IEEE 802.15.4 / Cryptography / Computing / IEEE 802

Security Considerations for IEEENetworks Naveen Sastry David Wagner University of California, Berkeley

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:45
323HTTP / HTTP Secure / Secure communication / Integrity / Plug-in / Technology / Computing / Cryptographic protocols / Software

GlassTube: A Lightweight Approach to Web Application Integrity Per A. Hallgren Daniel T. Mauritzson Andrei Sabelfeld Chalmers University of Technology, Gothenburg, Sweden

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:10
324Secure two-party computation / Pseudorandomness / Random oracle / Security parameter / Zero-knowledge proof / IP / Universal composability / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:37:56
325Key management / Certificate authorities / Secure communication / DigiCert / Certificate signing request / HTTP Secure / Public key certificate / X.509 / Comparison of SSL certificates for web servers / Cryptography / Cryptographic protocols / Public-key cryptography

Double Feature Talk 1) Intro to SSL 2) Git Basics for Devs & Designers SSL

Add to Reading List

Source URL: calgary.wordcamp.org

Language: English - Date: 2015-05-24 02:19:31
326Cryptography / Distance-bounding protocol / IP / NP / Alice and Bob / Formal verification / Challenge-response authentication / The Verifier / Transmission Control Protocol / Theoretical computer science / Cryptographic protocols / Applied mathematics

Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:49
327Business / Auction / Secure multi-party computation / Trusted third party / Universal composability / Vickrey auction / Online auction business model / Bid / Cryptography / Auction theory / Auctioneering / Cryptographic protocols

BRICS RSBogetoft et al.: Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-06-06 07:42:15
328Cryptography / Mathematics / Secure multi-party computation / Function / Communications protocol / Security parameter / Cryptographic primitive / Secure two-party computation / Cryptographic protocols / Data / Information

Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2015-07-03 05:13:02
329Cryptographic hash functions / Internet protocols / Secure communication / HMAC / Block cipher / SHA-2 / Symmetric-key algorithm / MD4 / RC4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_enisa08v4.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:05
330Cryptographic protocols / Internet standards / Secure communication / Keystore / HTTP Secure / X.509 / Self-signed certificate / Public key certificate / Transport Layer Security / Cryptography / Public-key cryptography / Key management

Lexmark International Markvision Enterprise SSL Configuration White Paper June 2015

Add to Reading List

Source URL: www.lexmark.com

Language: English - Date: 2015-07-17 20:29:14
UPDATE