Cryptographic protocols

Results: 3642



#Item
701Tunneling protocols / Data / Network architecture / IPsec / Advanced Encryption Standard / Disk encryption / Cryptography / Cryptographic protocols / Internet protocols

USER CASE REDEFINING SECURITY Global Bank IDQ Secures Global Wide Area Network Multipoint 100 Megabit Ethernet Encryption

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
702Electronic commerce / Financial cryptography / Bitcoin / Peer-to-peer computing / Cryptographic protocols / Proof-of-work system / Hash tree / Electronic money / Double-spending / Cryptography / Computing / Payment systems

Zerocoin: Anonymous Distributed E-Cash from Bitcoin Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin The Johns Hopkins University Department of Computer Science, Baltimore, USA {imiers, cgarman, mgreen, rubin}@

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2013-05-20 18:39:31
703Communications protocol / Data transmission / Protocols / Public-key cryptography / Cryptographic protocols / Network protocols / Cryptography / Data / Information

Compositional Analysis of Contract Signing Protocols Michael Backes a , Anupam Datta b , Ante Derek b , John C. Mitchell b and Mathieu Turuani c a Saarland

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:01:14
704Internet / Internet standards / HTTP / MIME / Cryptographic protocols / Internet media type / DomainKeys Identified Mail / Cypherpunk anonymous remailer / Computing / Email / OSI protocols

Memory Hole: Cryptographic protection for e-mail headers Daniel Kahn Gillmor <> IETF 92 Dallas, March 2015

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-03-22 21:24:43
705Cryptographic protocols / Secret sharing / Dropbox / Cloud computing / Computing / Software

PDF Document

Add to Reading List

Source URL: www.buildingtrustincloud.org

Language: English - Date: 2014-10-09 07:27:13
706Cryptographic protocols / Secure communication / Internet standards / Data loss prevention software / Transport Layer Security / Cloud computing / Information privacy / Internet privacy / Data security / Computing / Computer security / Internet

DLP-diagram-simplified-v2-vertical

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:28
707Electronic commerce / Financial cryptography / Bitcoin / Peer-to-peer computing / Cryptographic protocols / Proof-of-work system / Hash tree / Electronic money / Double-spending / Cryptography / Computing / Payment systems

Zerocoin: Anonymous Distributed E-Cash from Bitcoin Ian Miers, Christina Garman, Matthew Green, Aviel D. Rubin The Johns Hopkins University Department of Computer Science, Baltimore, USA {imiers, cgarman, mgreen, rubin}@

Add to Reading List

Source URL: isi.jhu.edu

Language: English - Date: 2013-04-11 16:49:44
708Commitment scheme / Advantage / Ciphertext indistinguishability / Secure multi-party computation / RSA / Semantic security / Cryptography / Cryptographic protocols / Universal composability

Games and the Impossibility of Realizable Ideal Functionality Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Ajith Ramanathan1 , and Andre Scedrov2 1

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:29:59
709Data / Cryptographic protocols / Internet protocols / Tunneling protocols / IPsec / Internet privacy / IPv6 / Internet security / Virtual private network / Computing / Network architecture / Computer network security

Internet Security Protocols Goal To expedite the research, development, standardization and commercialization of next generation Internet security and IPv6 technology. To deliver rapid prototypes and testing technology t

Add to Reading List

Source URL: w3.antd.nist.gov

Language: English - Date: 1999-01-29 10:45:33
710Verifiable secret sharing / Gödel Prize / Interactive proof system / Claude Crépeau / Pseudorandom function family / Probabilistic encryption / Oblivious transfer / Zero-knowledge proof / Provable security / Cryptography / Cryptographic protocols / Silvio Micali

Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-04-22 20:29:48
UPDATE