Cryptographic protocols

Results: 3642



#Item
521Phishing / Social engineering / Spamming / Cryptographic protocols / Cross-site scripting / Password / Two-factor authentication / Transport Layer Security / Transaction authentication number / Cybercrime / Computing / Security

Phishing with Super Bait Jeremiah Grossman WhiteHat Security Founder and Chief Technology Officer

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:35
522Internet standards / Internet protocols / FTP / Cryptographic protocols / FTPS / File Transfer Protocol / Secure Shell / Transport Layer Security / Sysax Multi Server / Internet / Computing / Network architecture

H High Performance Secure FTP/SFTP Server TurboSoft develops secure file transfer client and server products which offer manageable, scalable, automated file transfer solution. Share information

Add to Reading List

Source URL: www.tbsoftinc.com

Language: English - Date: 2009-08-07 00:06:19
523Wireless / Telecommunications engineering / Payment systems / Cryptographic protocols / Wireless security / Payment Card Industry Data Security Standard / Wireless access point / Wireless LAN / Wi-Fi / Wireless networking / Technology / Computer network security

VISA DATA SECURITY BULLETIN 9 September 2010 Wireless Networks Requires Data Security Controls Merchants that have implemented or are considering using wireless technology must develop and deploy

Add to Reading List

Source URL: en.chasepaymentech.ca

Language: English - Date: 2015-05-28 10:12:02
524Computing / Cyberwarfare / Cryptographic protocols / IEEE 802.11 / Wired Equivalent Privacy / Wireless security / Lightweight Extensible Authentication Protocol / Wi-Fi Protected Access / RC4 / Cryptography / Computer network security / Wireless networking

Identifying and Responding to Wireless Attacks Chris Hurley (roamer) Contents

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:35
525Internet protocols / Cryptographic protocols / Internet standards / Public-key cryptography / Key management / Transport Layer Security / Key distribution / Email / Peer-to-peer / Cryptography / Computing / Internet

Scaling Secure Group Communication Systems: Beyond Peer-to-Peer Yair Amir ∗ Cristina Nita-Rotaru ∗ Jonathan Stanton †

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:36
526Computing / Burrows–Abadi–Needham logic / Cryptography / Communications protocol / Protocol / Data / Information / Cryptographic protocols

Fast Automatic Security Protocol Generation Hongbin Zhou Simon N. Foley∗ Department of Computer Science University College, Cork, Ireland {zhou,s.foley}@cs.ucc.ie

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2013-02-18 06:01:24
527Internet protocols / Internet standards / Cryptographic protocols / Public-key cryptography / Network Security Services / Cryptlib / X.509 / OpenSSL / PKCS / Cryptography / Cryptographic software / Computing

Planning for an open-source entrant in the PKI interoperability trials Andrew Findlay 9th June 2001

Add to Reading List

Source URL: www.skills-1st.co.uk

Language: English - Date: 2012-06-06 14:30:59
528Cryptographic protocols / Block cipher modes of operation / Crypto++ / Password-authenticated key agreement / Cryptography / Public-key cryptography / Cryptographic software

Secure Communications over Insecure Channels based on Short Authenticated Strings Serge Vaudenay http://lasecwww.epfl.ch/

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-29 14:38:56
529Secure multi-party computation / Zero-knowledge proof / Standard model / IP / Random oracle / Communications protocol / Commitment scheme / NP / Transmission Control Protocol / Cryptography / Cryptographic protocols / Secure two-party computation

How To Play Almost Any Mental Game Over The Net — Concurrent Composition via Super-Polynomial Simulation Boaz Barak∗ Department of Computer Science Princeton University Princeton, New Jersey

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:49:36
530Key size / Public-key cryptography / Whitfield Diffie / Key-agreement protocol / Diffie–Hellman problem / Index of cryptography articles / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:43
UPDATE