Cryptographic protocols

Results: 3642



#Item
511HTTP / Federated identity / CoSign single sign on / Computer network security / Internet privacy / Cryptographic protocols / Kerberos / Load balancing / Server / Software / Computing / System software

Setting Up Cosign Clients March 4, 2003 This presentation was originally given at an Academic Computing Support Forum (ACSF) meeting at the University of Michigan.

Add to Reading List

Source URL: weblogin.org

Language: English
512Cryptographic protocols / Electronic commerce / Internet standards / Extended Validation Certificate / Public key certificate / X.509 / Certificate policy / CA/Browser Forum / Revocation list / Cryptography / Key management / Public-key cryptography

WoSign eCommerce Services Limited 502#, Block A, Technology Building 2, No. 1057, Nanhai Blvd. Nanshan District, Shenzhen, China Tel: +Fax: +

Add to Reading List

Source URL: www.wosign.com

Language: English - Date: 2013-04-02 10:40:00
513Cyberwarfare / Cryptographic protocols / Network protocols / Computer network security / Secure communication / HTTP cookie / Session fixation / Session management / Session / Computing / HTTP / Computer security

Improving the Security of Session Management in Web Applications Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium Email: {firstname.lastname}@cs.kuleuven.be

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
514Electronic commerce / Security / Cyberwarfare / Computing / Internet standards / Public key certificate / X.509 / Self-signed certificate / Certificate authority / Public-key cryptography / Key management / Cryptographic protocols

Using TLS with Radmind VersionThis document describes how to configure and use certificates for the radmind client and server. Creating a Certificate Authority

Add to Reading List

Source URL: rsug.itd.umich.edu

Language: English - Date: 2005-08-18 16:57:37
515Identity / Public-key cryptography / Cryptographic protocols / Electronic commerce / X.509 / IBM / Credential / OpenID / Security Assertion Markup Language / Cryptography / Identity management / Computing

Features and concepts of Privacy-ABCs Gregory Neven, IBM Research – Zurich © 2014 IBM Corporation

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 08:40:38
516Crime prevention / National security / Electronic commerce / Secure communication / Computer security / Information security / Password / Transport Layer Security / Smart card / Security / Cryptography / Cryptographic protocols

Hitachi Review Vol), NoFeatured Articles

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-03-31 01:09:08
517Cryptographic protocols / Digital signature / Paperless office / Public key infrastructure / Electronic signature / X.509 / Legal instrument / Signature / Cryptography / Public-key cryptography / Key management

Brochure_VMESign_New2adjusted

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:01:38
518Electronic engineering / Wireless / Network access / Computer network security / Cryptographic protocols / IEEE 802.11 / Wireless access point / Wireless security / Wireless LAN / Wireless networking / Technology / Wi-Fi

  NOIN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT BENJAMIN JOFFE, et al.,

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2012-04-02 11:35:58
519Information / Communications protocol / Transport Layer Security / Security protocol notation / Public-key cryptography / Transmission Control Protocol / Diffie–Hellman key exchange / HMAC / Cryptographic protocols / Cryptography / Data

AnBx - Security Protocols Design and Verification? Michele Bugliesi and Paolo Modesti Universit` a Ca’ Foscari Venezia Dipartimento di Informatica {bugliesi,modesti}@dsi.unive.it

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2010-06-10 05:02:59
520Software / Internet protocols / Cryptographic protocols / Computer network security / Kerberos / Network file systems / Telnet / Secure Shell / Generic Security Services Application Program Interface / Computing / Internet standards / Internet

Secure Endpoints Inc. 255 West 94th Street PHB New York NYUSA +office +mobile

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2004-12-20 01:47:48
UPDATE