Cryptographic protocols

Results: 3642



#Item
31Cisco Catalyst 3750-X Switch  FIPSNon Proprietary Security Policy Level 1 Validation  Version 0.4

Cisco Catalyst 3750-X Switch FIPSNon Proprietary Security Policy Level 1 Validation Version 0.4

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-08-04 07:52:28
32The TCPProxy Table of contents 1 Starting the TCPProxy..................................................................................................2 2 Preparing the Browser...........................................

The TCPProxy Table of contents 1 Starting the TCPProxy..................................................................................................2 2 Preparing the Browser...........................................

Add to Reading List

Source URL: grinder.sourceforge.net

Language: English - Date: 2014-05-20 07:02:06
33Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2015-12-16 04:48:58
34Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange

Item Title Consolidated iTC Feedback – DNcPPv2 SD Reviewer iTC Editorial Team Item Identifier NDcPPv2 Supporting Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 09:29:08
35Developing and Testing Web APIs From a curl one-liner to a MooseX::App German Perl Workshop 2015, Dresden/Germany Daniel Böhmer Freelance Software Developer, Perl since 2010

Developing and Testing Web APIs From a curl one-liner to a MooseX::App German Perl Workshop 2015, Dresden/Germany Daniel Böhmer Freelance Software Developer, Perl since 2010

Add to Reading List

Source URL: www.daniel-boehmer.de

Language: English - Date: 2015-05-07 04:01:29
36Secure Business Connectivity  HOBLink VPN 2.1 Gateway The VPN Solution for More Security and Greater Flexibility  Edition 10|13

Secure Business Connectivity HOBLink VPN 2.1 Gateway The VPN Solution for More Security and Greater Flexibility Edition 10|13

Add to Reading List

Source URL: www.hobsoft.com

Language: English - Date: 2014-01-10 07:06:54
37Microsoft PowerPoint - preneel_iacr_dl_vienna2016_print.pptx

Microsoft PowerPoint - preneel_iacr_dl_vienna2016_print.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2016-05-11 07:33:19
38L1 - Faster Development and Benchmarking of Cryptographic Protocols Axel Schr¨opfer, Florian Kerschbaum, Debmalya Biswas, Steffen Geißinger, and Christoph Sch¨ utz SAP Research Karlsruhe, Germany

L1 - Faster Development and Benchmarking of Cryptographic Protocols Axel Schr¨opfer, Florian Kerschbaum, Debmalya Biswas, Steffen Geißinger, and Christoph Sch¨ utz SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2009-09-30 17:02:37
39IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
40Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2)  Definition of zero-knowledge (ZK)

Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2) Definition of zero-knowledge (ZK)

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-03-06 05:37:28