Cryptographic protocols

Results: 3642



#Item
481Key management / Electronic commerce / Secure communication / Transport Layer Security / X.509 / Certificate authority / Public key certificate / HTTP Secure / RSA / Cryptography / Public-key cryptography / Cryptographic protocols

When Private Keys are Public: Results from the 2008 Debian OpenSSL Vulnerability Scott Yilek Eric Rescorla

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-07 21:20:06
482IP / Interactive proof system / Mathematics / Zero-knowledge proof / Soundness / Expected value / Non-interactive zero-knowledge proof / Information / Cryptographic protocols / Applied mathematics / Proof of knowledge

Proving Computational Ability Mihir Bellare Oded Goldreichy August 1992

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:28:46
483Computer security / Yahoo! / Computing / Email / DomainKeys Identified Mail / Author Domain Signing Practices / DomainKeys / Email address / Domain Name System / Email authentication / Spam filtering / Cryptographic protocols

Internet Engineering Task Force (IETF) Request for Comments: 5863 Category: Informational ISSN: T. Hansen

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-05-27 14:26:10
484Open formats / Technical communication / Cryptographic protocols / XML / Certificate policy / Text Encoding Initiative / Uniform resource identifier / X.509 / Portable Document Format / Computing / Markup languages / Computer file formats

Computational Techniques for Increasing PKI Policy Comprehension by Human Analysts ∗ Gabriel A. Weaver

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-06-15 09:26:43
485Cryptographic software / Internet protocols / Internet standards / Secure Shell / OpenSSH / Telnet / Rlogin / File Transfer Protocol / SSH Communications Security / System software / Software / Computing

Risks of Unmanaged Encrypted Environments  to Critical National Infrastructures Tatu Ylönen Founder and CEO SSH Communications Security

Add to Reading List

Source URL: www.jnsa.org

Language: English - Date: 2014-02-04 01:44:37
486Zero-knowledge proof / Proof of knowledge / IP / Mathematical proof / Markov chain / Commitment scheme / Alice and Bob / Random oracle / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Private Client-Side Profiling with Random Forests and Hidden Markov Models George Danezis1 , Markulf Kohlweiss1 , Benjamin Livshits1 , and Alfredo Rial2 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-06-02 16:07:22
487Computer security / Computer network security / Authentication protocol / Authentication / Kerberos / Cryptography / Cryptographic protocols / Security

Demarcation of Security in Entity Authentication Protocols Naveed Ahmed & Christian D. Jensen DTU Informatics, Denmark July 6, 2011

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:29:53
488Internet protocols / Key management / Public-key cryptography / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Key size / Secure Shell / Key / Cryptography / Secure communication / Cryptographic protocols

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography Vipul Gupta, Douglas Stebila∗, Stephen Fung* , Sheueling Chang Shantz, Nils Gura, Hans Eberle Sun Microsystems, IncCasey Avenue

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:42
489Qualys / Internet / Network architecture / Electronic commerce / HTTP / Transport Layer Security / HTTP Secure / Application programming interface / Password / Computing / Cryptographic protocols / Secure communication

Qualys SSL Labs Terms of Use v2.2 ! By accessing, browsing or using this website, and/or downloading any of its software, content or information, you acknowledge that you have read, understand and agree to be bound by t

Add to Reading List

Source URL: dev.ssllabs.com

Language: English - Date: 2015-05-17 07:50:02
490Computer network security / Cryptographic protocols / Electronics / Internet / Networking hardware / G.992.5 / Wireless security / Home network / Asymmetric digital subscriber line / Digital subscriber line / Computing / Wi-Fi

MediaAccess TG582n Wireless n Multi-User ADSL2+ Gateway  telecom

Add to Reading List

Source URL: www.nerim.fr

Language: English - Date: 2014-01-15 05:32:19
UPDATE