Cryptographic protocols

Results: 3642



#Item
461Computing / IEEE 802.11 / Technology / Wireless / Wi-Fi Protected Access / Wi-Fi / Wired Equivalent Privacy / Wireless LAN / Password / Wireless networking / Computer network security / Cryptographic protocols

Securing Your Home Wireless Network Securing Your Home Wireless Network - Do’s and Don’ts • When creating passwords for your networks devices, ensure that they are sufficiently long and complex by using uppercase l

Add to Reading List

Source URL: www.cannon.af.mil

Language: English - Date: 2014-12-03 12:43:10
462Cryptographic protocols / Cryptographic software / Hashing / Secure communication / IPsec / HMAC / Secure Shell / Key generation / Cryptographic hash function / Cryptography / Computing / Internet protocols

IC2M Security Policy_rel5

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-28 11:20:09
463FEAL / Lecture Notes in Computer Science / International Cryptology Conference / Computational hardness assumptions / Cryptographic protocols / Diffie–Hellman problem / Index of cryptography articles / Cryptography / LOKI / Data Encryption Standard

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
464A10 Networks / Denial-of-service attack / HTTP Secure / Computing / Transmission Control Protocol / Cyberwarfare / Security / Load balancing / Computer network security / Cryptographic protocols / Secure communication

4 REASONS you need a HIGH PERFORMANCE ADC

Add to Reading List

Source URL: www.a10networks.com

Language: English - Date: 2015-03-10 18:51:23
465Key management / Diffie–Hellman key exchange / Ciphertext / Cryptographic hash function / Vigenère cipher / RSA / Key / Cryptanalysis / Whitfield Diffie / Cryptography / Cryptographic protocols / Public-key cryptography

174 BLOWN TO BITS Lessons for the Internet Age Let’s pause for a moment to consider some of the lessons of cryptographic

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2012-03-17 16:37:42
466Cryptographic protocols / Internet protocols / Wireless networking / Ericsson / 3GPP Long Term Evolution / Datagram Transport Layer Security / 4G / ZigBee / Wi-Fi / Technology / Computing / Electronics

myOmega_leaflet_services_V2.indd

Add to Reading List

Source URL: www.myomegasys.com

Language: English - Date: 2015-02-19 06:17:58
467Cryptographic protocols / HTTP / Electronic commerce / Public key certificate / HTTP Secure / Self-signed certificate / Certificate authority / Root certificate / Cryptography / Public-key cryptography / Key management

Deprecating Non-Secure HTTP Frequently Asked Questions   Since we announced our plan to ​ focus on HTTPS going forward​ , there have been some 

Add to Reading List

Source URL: ffp4g1ylyit3jdyti1hqcvtb-wpengine.netdna-ssl.com

Language: English - Date: 2015-05-01 22:35:50
468Secure communication / Transport Layer Security / Symmetric-key algorithm / RC4 / Block cipher modes of operation / Stream cipher / Ciphertext / Padding / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36
469Internet protocols / Data / Network architecture / IPsec / Virtual private network / Computing / Computer network security / Cryptographic protocols

E-1000x The Network Box E-1000x is a member of the Network Box S-M-E product range. This model is the current flagship of the Network Box range of security appliances. Designed from the outset for the Enterprise marketp

Add to Reading List

Source URL: www.cmssoft.co.uk

Language: English - Date: 2015-04-01 11:10:38
470Machine learning / AKA / Secure Shell / Perfect forward secrecy / Data / Information / Computing / Cryptography / Cryptographic protocols / Learning with errors

Post-quantum Authenticated Key Exchange from Ideal Lattices ¨ u¨ r Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg 1 Institute of Software, Chinese Academy of Sciences, China

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:41:32
UPDATE