Cryptographic protocols

Results: 3642



#Item
371Network architecture / Data / Packet Processing / Forwarding plane / IPsec / Datagram Transport Layer Security / Transmission Control Protocol / Transport Layer Security / Throughput / Cryptographic protocols / Computing / Internet protocols

bloc marque driving trust cmjn

Add to Reading List

Source URL: www.insidesecure.com

Language: English
372Cryptographic protocols / Computer security / Internet standards / Secure communication / Transport Layer Security / Jericho Forum / De-perimeterisation / Advanced Encryption Standard / Public-key cryptography / Cryptography / Data security / Security

Microsoft Word - Contents Thesis 1.10.doc

Add to Reading List

Source URL: www.few.vu.nl

Language: English - Date: 2015-06-15 16:32:20
373Cryptographic protocols / Secure communication / Electronic commerce / Transport Layer Security / HTTP Secure / Extended Validation Certificate / Public key certificate / Certificate authority / Man-in-the-middle attack / Cryptography / Key management / Public-key cryptography

An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar William Enck

Add to Reading List

Source URL: www.mostconf.org

Language: English - Date: 2014-05-17 09:17:52
374Computing / Secure Shell / BoKS / Cryptographic protocols / Remote administration software / Password / Ssh-agent / Ssh-keygen / System software / Software / Cryptographic software

WHITE PAPER TAMING THE BEAST Controlling SSH for Security and Compliance

Add to Reading List

Source URL: www.foxt.com

Language: English - Date: 2015-05-01 09:55:47
375Cryptographic protocols / Internet protocols / Internet standards / Certificate policy / Revocation list / Public key certificate / X.509 / Certificate authority / Public key infrastructure / Cryptography / Public-key cryptography / Key management

Certificate Policy and Practice Statement for the NCSA SLCS National Center for Supercomputing Applications (NCSA) Version 1.4 (Tue Apr 6 17:11:23 CDTContents 1

Add to Reading List

Source URL: security.ncsa.illinois.edu

Language: English - Date: 2010-04-06 18:16:23
376Information / NSA Suite B Cryptography / Internet Key Exchange / IPsec / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / Elliptic Curve DSA / Key-agreement protocol / Diffie–Hellman key exchange / Cryptographic protocols / Cryptography / Data

Internet Engineering Task Force (IETF) Request for Comments: 6380 Category: Informational ISSN: K. Burgin

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-10-18 14:31:43
377Scripting languages / Cryptographic protocols / Secure communication / Firefox / Google Chrome / JavaScript / Transport Layer Security / Opera / Mobile application development / Software / Web browsers / Portable software

A First Look at Firefox OS Security Daniel DeFreez∗ , Bhargava Shastry† , Hao Chen∗ , Jean-Pierre Seifert† ∗ University of California, Davis {dcdefreez, chen}@ucdavis.edu

Add to Reading List

Source URL: www.mostconf.org

Language: English - Date: 2014-05-17 09:18:10
378Internet / Cryptographic protocols / Public-key cryptography / Internet standards / HTTP / Network Time Protocol / Cryptographic hash function / HTTP cookie / X.509 / Cryptography / Computing / Internet protocols

Microsoft PowerPoint - secproto.ppt

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2005-10-31 14:46:23
379Secure communication / Computing / Internet protocols / Security / Internet standards / Transport Layer Security / Cipher suite / GnuTLS / HTTP Secure / Cryptography / Cryptographic protocols / Cryptographic software

2013 IEEE Symposium on Security and Privacy Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan∗ , C´edric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , Pierre-Yves Strub‡ ∗ IN

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:46
380XTR / Secure multi-party computation / Alice and Bob / Diffie–Hellman key exchange / Public-key cryptography / PP / X Window System / Commitment scheme / Cryptography / Cryptographic protocols / Oblivious transfer

One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2000-04-12 11:39:28
UPDATE