Cryptographic protocols

Results: 3642



#Item
381Cryptographic protocols / Internet protocols / Internet standards / Revocation list / Certificate policy / Online Certificate Status Protocol / Public key certificate / Certificate authority / X.509 / Cryptography / Public-key cryptography / Key management

CERTIFICATION PRACTICE STATEMENT SUPPORT OF OPENTRUST ELECTRONIC CERTIFICATION SERVICES Date:

Add to Reading List

Source URL: www.opentrust.com

Language: English - Date: 2015-06-17 04:55:04
382Cryptographic protocols / Computing / GnuTLS / Internet protocols / Secure communication / Internet standards / Comparison of TLS Implementations / TLS-SRP / Cryptographic software / System software / Cryptography

Introduction to GnuTLS Simon Josefsson http://josefsson.org/ http://www.gnutls.org/

Add to Reading List

Source URL: josefsson.org

Language: English - Date: 2012-09-11 01:52:01
383Security / Data / Identity management / Security Assertion Markup Language / Password / HTTP Secure / Computing / Cryptographic protocols / Secure communication

Security  Guide,  April  2015           Zoom  is  a  cloud  service  that  provides  a  3-­‐in-­‐1  meeting  platform  with  HD  video  conferencing

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-05-11 03:21:53
384Electronic commerce / Cryptographic protocols / Ciphertext / Key / Password / Malware / Man-in-the-middle attack / RSA / Key encapsulation / Cryptography / Public-key cryptography / Key management

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-04-03 00:22:05
385Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
386System software / Computer architecture / Content-control software / Fortinet / Windows Server / Cryptographic protocols / Application firewall / Windows / IPsec / Computer network security / Computing / Tunneling protocols

FortiClientTM Endpoint Security Application FortiClient is an all-in-one comprehensive security solution that extends the power of FortiGate’s unified threat management to endpoints on your network. Desktops, laptops,

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:13
387Computing / Internet protocols / Tunneling protocols / IPsec / IPv6 / Security association / Cryptographic protocols / Network architecture / Data

WIDE Technical-Report inConfiguring IPsec for SHISA/MIPL wide-tr-nautilus6-configuring-ipsec-for-shisa-mipl-00.pdf WIDE Project : http://www.wide.ad.jp/

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2006-06-21 07:42:40
388Key management / Online chat / Man-in-the-middle attack / Public-key cryptography / Secure messaging / ID-based encryption / Secure communication / Email encryption / ZRTP / Cryptography / Cryptographic protocols / Internet privacy

SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2015-04-11 10:28:11
389Algebra / Zero-knowledge proof / Proof of knowledge / XTR / IP / Weight / Cryptography / Cryptographic protocols / Abstract algebra

Thinking Inside the BLAC Box:* Smarter Protocols for Faster Anonymous Blacklisting Ryan Henry Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2013-09-04 10:18:33
390Mathematical logic / Model theory / Proof of knowledge / Functions and mappings / IP / Zero-knowledge proof / Structure / Functor / Soundness / Mathematics / Cryptographic protocols / Logic

A Machine-Checked Formalization of Sigma-Protocols Gilles Barthe, Daniel Hedin, Santiago Zanella B´eguelin IMDEA Software, Madrid, Spain {Gilles.Barthe, Daniel.Hedin, Santiago.Zanella}@imdea.org Abstract—Zero-knowled

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
UPDATE