Cryptographic protocols

Results: 3642



#Item
741Information / Electronic commerce / Secure communication / Email / HTTP / Public key certificate / HTTP Secure / Data Validation and Certification Server / Transport Layer Security / Computing / Internet / Cryptographic protocols

Kun testisanoman lähettäminen ei onnistu

Add to Reading List

Source URL: www.tulli.fi

Language: English - Date: 2015-03-09 06:56:01
742Cryptographic protocols / Notary / Digital signature / Public key certificate / Key / Authentication / Man-in-the-middle attack / MIKEY / Cryptography / Public-key cryptography / Key management

PROTOCOLS FOR PUBUC KEY CRYPTOSYSTEMS Ralph C. Merkle ELXSi International ......

Add to Reading List

Source URL: www.merkle.com

Language: English - Date: 2010-07-19 01:52:15
743Secret sharing / Proactive secret sharing / Commitment scheme / Verifiable secret sharing / Cryptography / Cryptographic protocols / Key management

Sequential Secret Sharing as a New Hierarchical Access Structure Mehrdad Nojoumian ∗ Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University Boca Raton, Florida, USA mnojoumia

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 10:57:06
744Security / HTTP / Cryptographic software / Cryptographic protocols / HTTP Secure / Secure communication / Inspector General / Tor / Gmail / Internet privacy / Computing / Internet

WASHINGTON LEGISLATIVE OFFICE April 14, 2015 Tony Scott U.S. Chief Information Officer

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-15 17:02:02
745Public-key cryptography / Electronic commerce / Cryptographic protocols / Key management / Transport Layer Security / Certificate authority / Public key certificate / Vulnerability / OpenVPN / Cryptography / Computing / Secure communication

The Matter of Heartbleed *Zakir Durumeric1 , James Kasten1 , David Adrian1 , J. Alex Halderman1 , Michael Bailey1,2 2

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2014-12-24 15:14:39
746Cryptographic protocols / Electronic commerce / Secure communication / Public key certificate / Certificate authority / X.509 / HTTP Secure / Self-signed certificate / Certificate server / Cryptography / Public-key cryptography / Key management

SPECIAL TERMS AND CONDITIONS FOR SSL CERTIFICATES 1. Services 1.1

Add to Reading List

Source URL: go.melbourneitenterprise.com.au

Language: English - Date: 2015-04-28 20:31:04
747Warranty / TACLANE / 1G / Virtual LAN / Data / Information / Cryptographic protocols / High Assurance Internet Protocol Encryptor / Cyberwarfare

Microsoft Word - TACLANE-1G price.NOV.2014.doc

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2015-05-05 05:07:17
748Computing / United States government secrecy / High Assurance Internet Protocol Encryptor / File managers / Windowing systems / TACLANE / Graphical Environment Manager / National Security Agency / GEM / Software / Cryptographic protocols / System software

Microsoft Word - GEM_X_Price.March_2014.doc

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2015-05-05 05:07:14
749Non-interactive zero-knowledge proof / Mathematical proof / Zero-knowledge proof / Commitment scheme / Cryptography / Cryptographic protocols / Decision Linear assumption

Groth–Sahai proofs revisited E. Ghadafi, N.P. Smart, and B. Warinschi Dept. Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-17 10:23:34
750Online Certificate Status Protocol / European Network and Information Security Agency / Internet / Computer security / Computing / Public-key cryptography / DigiNotar / Cryptographic protocols

ENISA working on Article 19 Dr. Marnix Dekker Dr. Kostas Moulinos Security expert, Information security officer ENISA

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
UPDATE