Cryptographic protocols

Results: 3642



#Item
541Computing / Burrows–Abadi–Needham logic / Cryptography / Communications protocol / Yahalom / Transmission Control Protocol / IP / Interpretation / Data / Information / Cryptographic protocols

A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:05:15
542Computing / Cryptographic protocols / IEEE 802.11 / Wireless / Information appliances / Wi-Fi / Personal digital assistant / Wireless access point / Palm OS / Computer network security / Wireless networking / Technology

FIREBALL HOME NETWORKING AND CONNECTIONS

Add to Reading List

Source URL: www.escient.com

Language: English - Date: 2011-03-02 18:32:54
543Public-key cryptography / Cryptographic protocols / Elliptic curve cryptography / Key size / Elliptic curve Diffie–Hellman / Digital signature / Elliptic Curve DSA / Diffie–Hellman key exchange / Elliptic curve / Cryptography / Key management / Finite fields

Lecture 14: Elliptic Curve Cryptography and Digital Rights Management Lecture Notes on “Computer and Network Security” by Avi Kak () April 23, :55am

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-23 00:56:33
544File sharing networks / Cryptographic protocols / Secure communication / Cross-platform software / Kademlia / Peer-to-peer / Distributed hash table / Kad network / Transport Layer Security / Software / Computing / Distributed data storage

UNIVERSITY OF MANNHEIM Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia

Add to Reading List

Source URL: www.philippheckel.com

Language: English - Date: 2009-11-25 08:49:15
545Side channel attack / Diffie–Hellman key exchange / Advantage / Public-key cryptography / Semantic security / Cryptography / Cryptographic protocols / Random oracle

Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda1 1 Colin Boyd3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 00:49:04
546Computing / Internet protocols / Secure communication / HTTP / HTTP Secure / Port / Communications protocol / Transmission Control Protocol / ARPANET / Data / Cryptographic protocols / Information

Communication over Challenged Networks Keith Winstein Stanford University Secure Internet of Things Project Workshop Stanford University

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2014-11-10 17:36:13
547Internet standards / Internet protocols / Email / HTTP / Cryptographic protocols / Hypertext Transfer Protocol / Transport Layer Security / URI scheme / Representational state transfer / Computing / Internet / Network architecture

Internet Engineering Task Force (IETF) Request for Comments: 7230 Obsoletes: 2145, 2616 Updates: 2817, 2818 Category: Standards Track ISSN:

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-06-06 21:14:27
548Secure communication / Electronic commerce / Learning with errors / NTRU / Transport Layer Security / Cipher suite / Elliptic curve cryptography / Quantum computer / RSA / Cryptography / Cryptographic protocols / Internet protocols

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:27:47
549Direct Anonymous Attestation / Internet privacy / Civil law / Authentication / Computer security / AKA / Cryptographic protocols / Security / Cryptography

Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs Patrick P. Tsang† , Man Ho Au§ , Apu Kapadia†‡ , Sean W. Smith† † Department of Computer Science

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:08
550Consensus / Alice and Bob / Constructible universe / IP / Cryptography / Cryptographic protocols / Public-key cryptography

Of Malicious Motes and Suspicious Sensors On the efficiency of malicious interference in wireless networks Seth Gilbert1 , Rachid Guerraoui2 , and Calvin Newport1 1 MIT CSAIL, {sethg,cnewport}@mit.edu

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2007-09-28 06:20:39
UPDATE