Cryptographic protocols

Results: 3642



#Item
641Computer security / Identity management / Identity management systems / Cloud standards / HTTP / Security Assertion Markup Language / OAuth / HTTP Secure / SAML 1.1 / Computing / Cryptographic protocols / Security

PDF Document

Add to Reading List

Source URL: www.tuxed.net

Language: English - Date: 2015-04-05 14:21:35
642Internet protocols / Internet standards / Cryptographic protocols / Key derivation function / PBKDF2 / Online Certificate Status Protocol / Digital signature / Password / Steganography / Cryptography / Key management / Public-key cryptography

Security  Highlights   The  IBM  Mobile  Iden7ty  framework  has  embraced  several  industry  standards  to  allow  applica7on   developers  to  create  secure  s

Add to Reading List

Source URL: www-01.ibm.com

Language: English - Date: 2014-11-20 11:27:30
643Cryptographic protocols / Secure communication / Password / FileVault / HTTP Secure / Security / Computing / Cryptography / Cryptographic software / Mac OS X

Technical Specifications CrashPlan PROe Security CrashPlan PROe is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops often

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-05-01 23:23:25
644Software / Electronic commerce / Bitcoin / Peer-to-peer computing / Cryptographic protocols / Electronic money / Double-spending / Bit / United States dollar / Financial cryptography / Payment systems / Computing

Zerocash Decentralized Anonymous Payments from Bitcoin Eli Ben-Sasson (Technion) Alessandro Chiesa (MIT) Christina Garman (JHU) Matthew Green (JHU)

Add to Reading List

Source URL: zerocash-project.org

Language: English
645Internet protocols / Internet standards / Cryptographic protocols / Transport Layer Security / Public key certificate / DigiCert / SSL acceleration / FTPS / Cryptography / Secure communication / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2013-07-30 16:30:53
646Cryptographic protocols / Internet privacy / Secure communication / .onion / Transport Layer Security / Certificate authority / Tor / Web of trust / HTTP Secure / Cryptography / Public-key cryptography / Key management

Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication Paul Syverson Griffin Boyce

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:01:25
647File sharing networks / Distributed data storage / Cryptographic protocols / Electronic commerce / Secure communication / Content delivery network / JavaScript / Transport Layer Security / Public key certificate / Computing / Concurrent computing / Distributed computing

Stickler: Defending Against Malicious CDNs in an Unmodified Browser Amit Levy Henry Corrigan-Gibbs

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:01:05
648Bitcoin / Peer-to-peer computing / Financial cryptography / Cryptographic protocols / Electronic commerce / Electronic money / Gold coin / United States dollar / Snark / Computing / Graph theory / Software

Zerocash: Decentralized Anonymous Payments from Bitcoin (extended version) Eli Ben-Sasson∗ Alessandro Chiesa†

Add to Reading List

Source URL: zerocash-project.org

Language: English
649Network architecture / Internet / Cross-domain solution / Server / Application layer / Transport Layer Security / Index of Internet-related articles / Background Intelligent Transfer Service / Internet protocols / Computing / Cryptographic protocols

High Speed Guard™ Automated, High-Performance Data Transfer. Features and Benefits

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
650Cryptographic protocols / Internet protocols / Internet standards / X.509 / Public key certificate / Public key infrastructure / Certificate authority / X.500 / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Key management

ReportThe Internet Infrastructure Foundation Kirei 2011:19

Add to Reading List

Source URL: www.iis.se

Language: English - Date: 2013-09-02 04:02:13
UPDATE