Cryptographic protocols

Results: 3642



#Item
721Secure multi-party computation / Computing / Universal composability / Communications protocol / Verifiable secret sharing / Boolean algebra / Π-calculus / Consensus / Cryptographic protocols / Data / Information

An Equational Approach to Secure Multi-party Computation∗ Daniele Micciancio† Stefano Tessaro‡ January 12, 2013

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-09-26 16:14:53
722Cryptography / Computing / Protocol composition logic / Transmission Control Protocol / Communications protocol / Kerberos / Data / Cryptographic protocols / Information

GDP Festschrift ENTCS, to appear Protocol Composition Logic (PCL) Anupam Datta

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:20:34
723Portable software / Cryptographic protocols / Online chat / Internet privacy / Cryptographic software / Off-the-Record Messaging / Authentication / Public key fingerprint / Pidgin / Software / Cryptography / Computing

A User Study of Off-the-Record Messaging Ryan Stedman Kayo Yoshida Ian Goldberg

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2008-07-15 11:07:12
724Burrows–Abadi–Needham logic / Belief revision / Epistemic modal logic / Communications protocol / Deniable authentication / IP / Cryptographic protocols / Data / Information

Belief Change and Cryptographic Protocol Verification Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.ca

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2008-05-19 14:54:15
725Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / Key-agreement protocol / Diffie–Hellman problem / ID-based encryption / XTR / Key exchange / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

ID-based Authenticated Two Round Multi-Party Key Agreement

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-20 20:23:11
726Proof of knowledge / IP / Soundness / Alice and Bob / NP / XTR / Zero-knowledge proof / Cryptographic protocols / Cryptography / Applied mathematics

Lecture 18 - Zero Knowledge (cont), identification protocols Boaz Barak April 7, 2010 Reading Boneh-Shoup chapter 18. Review Protocol QR

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-04-07 12:26:01
727Cryptographic protocols / Internet protocols / Internet standards / Network Address Translation / Network protocols / WebSocket / Extensible Messaging and Presence Protocol / Transport Layer Security / Secure Real-time Transport Protocol / Computing / Network architecture / Internet

WSQD™ Certification Become a WebRTC School Qualified Developer (WSQD™) supported by the Telecommunications Industry Association (TIA), Comptel, WebRTC World, USTelecom and more. Exam Objectives The WebRTC School Qual

Add to Reading List

Source URL: www.thesipschool.com

Language: English - Date: 2015-03-14 20:08:02
728Cross-platform software / Cryptographic protocols / Extensible Messaging and Presence Protocol / Online chat / Transport Layer Security / Application programming interface / World Wide Web / JavaScript / WebSocket / Computing / Software / Data

WebRTC School Qualified Developer (WSQD™) program Overview The WebRTC School™ is ‘the’ place to learn all about WebRTC, also known as Web Real-TimeCommunications. There is so much information on the internet abou

Add to Reading List

Source URL: www.thesipschool.com

Language: English - Date: 2015-03-14 20:06:45
729Computing / Data / Internet standards / Secure communication / Public-key cryptography / Transport Layer Security / X.509 / TLS-PSK / Public key certificate / Cryptographic protocols / Cryptography / Internet protocols

This Specification is provided for future development work within oneM2M only. The Partners accept no liability for any use of this Specification. The present document has not been subject to any approval process by the

Add to Reading List

Source URL: onem2m.org

Language: English - Date: 2015-02-01 09:31:22
730Cryptographic protocols / Chargeback / Online shopping / Payment gateway / Credit card / IP blocking / 3-D Secure / HTTP Secure / Eway / Electronic commerce / Merchant services / Payment systems

Retail Excellence Ireland Securing your Business Online REI estimates that around 7% of online orders in Ireland are fraud attempts and considering that this year, Ireland’s internet economy will be worth an estimated

Add to Reading List

Source URL: www.retailexcellence.ie

Language: English - Date: 2014-08-26 05:07:28
UPDATE