Cryptographic protocols

Results: 3642



#Item
421Security / Data / Identity management / Security Assertion Markup Language / Password / HTTP Secure / Computing / Cryptographic protocols / Secure communication

Security  Guide,  April  2015           Zoom  is  a  cloud  service  that  provides  a  3-­‐in-­‐1  meeting  platform  with  HD  video  conferencing

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-05-26 03:48:05
422Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-01-13 10:28:23
423Electronic commerce / Financial cryptography / Bitcoin / Peer-to-peer computing / Cryptographic protocols / Proof-of-work system / Hash tree / Electronic money / Double-spending / Cryptography / Computing / Payment systems

Zerocoin: Anonymous Distributed E-Cash from Bitcoin Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin The Johns Hopkins University Department of Computer Science, Baltimore, USA {imiers, cgarman, mgreen, rubin}@

Add to Reading List

Source URL: zerocoin.org

Language: English
424Cryptographic protocols / Portable software / FTP / Internet protocols / Health informatics / SSH File Transfer Protocol / FileZilla / File Transfer Protocol / Health Level 7 / Software / Computing / Network architecture

Meaningful Use Stage 2 (MU2) CCR Cancer Data Transmission Options Secure FTP Transmission 1. Request access to the Secure File Transfer Protocol (SFTP) service by sending a request to - with subject

Add to Reading List

Source URL: hie.cdph.ca.gov

Language: English - Date: 2015-01-29 18:01:01
425Cryptographic protocols / Electronic commerce / Internet protocols / Extended Validation Certificate / Entrust / Root certificate / Public key certificate / Certificate policy / X.509 / Cryptography / Key management / Public-key cryptography

Microsoft Word - Private Trust CPS EnglishVersion 1 2.doc

Add to Reading List

Source URL: www.entrust.net

Language: English - Date: 2015-05-21 14:11:21
426Internet privacy / Secure communication / Public-key cryptography / Secure Real-time Transport Protocol / Encryption / Shared secret / Key / Skype security / Index of cryptography articles / Cryptography / Key management / Cryptographic protocols

Secure Calls & Messages Best practice cryptography Peer-to-peer communication Maximum security Superior voice quality

Add to Reading List

Source URL: www.crypttalk.com

Language: English - Date: 2015-02-20 10:27:12
427Reservation / HTTP Secure / International relations / Security / Information / Password / Cryptographic protocols / HTTP

Navy Lodging Program Navy Getaways FAQ 1. Which credit cards does Navy Getaways accept? 2. Do you allow pets?

Add to Reading List

Source URL: www.dodlodging.net

Language: English - Date: 2014-03-19 07:34:00
428Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2012-01-15 19:52:05
429Internet protocols / Computing / Internet / Cryptographic software / Internet standards / Transport Layer Security / HTTP Secure / Cipher suite / OpenSSL / Cryptography / Secure communication / Cryptographic protocols

Preface You are about to undertake a journey into the mysterious world of cryptography. I’ve just completed mine—writing this book—and it’s been an amazing experience. Although I’d been a user of SSL since its

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-08 18:16:46
430Key management / Thawte / Public key certificate / Certificate signing request / HTTP Secure / X.509 / Cryptography / Cryptographic protocols / Public-key cryptography

Enrollment Guide for thawte Code Signing certificates A STEP-BY-STEP GUIDE to purchasing Code Signing certificates ... Enrollment Checklist

Add to Reading List

Source URL: www.thawte.com

Language: English - Date: 2011-01-19 15:38:39
UPDATE