Cryptographic protocols

Results: 3642



#Item
431Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:55
432Network architecture / Internet standards / URI schemes / Cryptographic protocols / Secure communication / HTTP pipelining / Transmission Control Protocol / Hypertext Transfer Protocol / HTTP Secure / Computing / Internet / HTTP

http2 explained Background, the protocol, the implementations and the future http://daniel.haxx.se/http2/ by Daniel Stenberg

Add to Reading List

Source URL: daniel.haxx.se

Language: English - Date: 2015-05-21 04:06:53
433Key management / Electronic commerce / Verifiable secret sharing / Key distribution / Interactive proof system / Diffie–Hellman key exchange / Authentication / Secret sharing / Computer network / Cryptography / Cryptographic protocols / Public-key cryptography

Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks Hitoshi Asaeda∗ , Musfiq Rahman† , Mohammad Hossein Manshaei‡ , Yasuko Fukuzawa§ University, Graduate School of Media and Governance

Add to Reading List

Source URL: web.sfc.wide.ad.jp

Language: English - Date: 2006-01-24 03:14:56
434News aggregators / Firefox / Safari / HTTP Secure / Browser wars / Features of Firefox / Software / Google Chrome / Cryptographic protocols

Microsoft Word - catalog_access.docx

Add to Reading List

Source URL: library.carr.org

Language: English - Date: 2015-05-02 16:54:01
435Data / Private information retrieval / Information / Database theory / Whois / Oblivious transfer / Database / Server / Cryptographic protocols / Computing / Database management systems

One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries Ryan Henry, Yizhou Huang, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo ON, Canada N2L 3

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-12-11 07:56:46
436Electronic commerce / Cryptographic protocols / Digital signature / Blind signature / RSA / BLS / Full Domain Hash / Token / Ecash / Cryptography / Public-key cryptography / Financial cryptography

SPEcTRe: Spot-checked Private Ecash Tolling at Roadside Jeremy Day Yizhou Huang Edward Knapp

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-08-21 13:44:16
437Public-key cryptography / Secure communication / Key management / Transport Layer Security / HTTP Secure / Cipher suite / Public key certificate / Certificate authority / Server Name Indication / Cryptography / Cryptographic protocols / Internet protocols

BULLETPROOF SSL AND TLS Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications Free edition: Getting Started

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-08 18:16:46
438Network architecture / Real Estate Transaction Standard / HTTP / Cryptographic protocols / World Wide Web / Hypertext Transfer Protocol / Digest access authentication / Representational state transfer / Session / Computing / Network protocols / Real estate

RETS Certification System RETSand 1.8 Testing Rules Version: 02 June 2014 RETS Compliance & Certification

Add to Reading List

Source URL: www.reso.org

Language: English - Date: 2014-06-19 14:06:06
439Cryptographic protocols / Cryptography standards / Electronic commerce / X.509 / Public key certificate / Certificate authority / PKCS12 / PKCS / HTTP Secure / Cryptography / Public-key cryptography / Key management

Microsoft Word - handouts-get-a-cert-LCGdoc

Add to Reading List

Source URL: certificate.nikhef.nl

Language: English - Date: 2006-07-27 08:52:10
440Public-key cryptography / Secret sharing / Key distribution / Proactive secret sharing / RSA / Verifiable secret sharing / Cryptography / Key management / Cryptographic protocols

Structuring Proactive Secret Sharing in Mobile Ad-hoc Networks ∗ Keio Hitoshi Asaeda∗ , Musfiq Rahman† , Yoshihiro Toyama∗ University, Graduate School of Media and Governance, 5322, Endo, Fujisawa-shi, Kanagawa,

Add to Reading List

Source URL: web.sfc.wide.ad.jp

Language: English - Date: 2006-01-19 05:59:36
UPDATE