Cryptographic protocols

Results: 3642



#Item
611Secure multi-party computation / Homomorphic encryption / Computational complexity theory / Computing / Boolean circuit / Circuit / Mathematics / Verifiable computing / Secure two-party computation / Cryptographic protocols / Cryptography / Applied mathematics

Computing on Encrypted Data Secure Internet of Things Seminar David Wu January, 2015 New Applications in the Internet of Things

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2015-01-12 23:28:56
612XTR / Function / Cryptographic protocols / Mathematics / Elliptic curve Diffie–Hellman / Public-key cryptography

A quantum-safe circuit-extension handshake for Tor

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:35:22
613IP / Homomorphic encryption / Zero-knowledge proof / NP / One-way function / Cryptography / Applied mathematics / Cryptographic protocols

ON NON-BLACK-BOX SIMULATION AND THE IMPOSSIBILITY OF APPROXIMATE OBFUSCATION ∗ NIR BITANSKY† AND OMER PANETH‡ Abstract. The introduction of a non-black-box simulation technique by Barak (FOCShas been a major

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 10:26:13
614Computing / Computer network security / Cryptographic protocols / Internet protocols / Authenticator / HTTP cookie / Digest access authentication / Password authentication protocol / Kerberos / HTTP / Computer security / Security

Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster fubob, sit, kendras, feamster @mit.edu  MIT Laboratory for Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:14
615Technology / Wireless / Computer network security / IEEE 802.11 / Wi-Fi / Wireless security / Extensible Authentication Protocol / IEEE 802.11i-2004 / Wi-Fi Protected Access / Wireless networking / Cryptographic protocols / Cryptography

Cisco − Wi−Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi−Fi Protected Access 2 (WPA 2) Configuration Example..........................................................................1 Do

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:29:05
616XTR / Normal distribution / Structure / Diffie–Hellman key exchange / YAK / Cryptographic protocols / Mathematics / Finite fields

1 Strongly Secure Authenticated Key Exchange from Ideal Lattices Xiaopeng Yang and Wenping Ma

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-12 05:00:54
617Technology / Wireless / Cryptographic protocols / IEEE 802.11 / Wi-Fi / Extensible Authentication Protocol / Wireless security / Wi-Fi Protected Access / Wpa supplicant / Wireless networking / Computer network security / Computing

Cisco − WPA Configuration Overview Table of Contents WPA Configuration Overview...........................................................................................................................1 To get Cisco

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:29:06
618Electronic commerce / Key management / Public-key cryptography / Cryptographic protocols / Secure communication / Transport Layer Security / Client–server model / Apache HTTP Server / Public key certificate / Cryptography / Computing / Internet

WebALPS: A Survey of E-Commerce Privacy and Security Applications S.W. Smith Department of Computer Science/ Institute for Security Technology Studies Dartmouth College Hanover, New HampshireUSA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:49:08
619Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Proxy server / HTTP Secure / Secure Shell / Cryptographic protocols / Computing / Secure communication

Performance Analysis of TLS Web Servers Cristian Coarfa, Peter Druschel and Dan S. Wallach Department of Computer Science Rice University Abstract TLS is the protocol of choice for securing today’s ecommerce and online

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:16:24
620Computer network security / Data / Internet protocols / Cryptographic protocols / Virtual private networks / IPsec / Layer 2 Tunneling Protocol / NAT-T / Point-to-Point Tunneling Protocol / Tunneling protocols / Computing / Network architecture

TheGreenBow IPSec VPN Client Configuration Guide 3COM X-FAMILY WebSite:

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2007-09-27 05:39:01
UPDATE