Cryptographic protocols

Results: 3642



#Item
751Proof of knowledge / Finite fields / IP / Zero-knowledge proof / Random oracle / NP / XTR / MQV / Cryptography / Cryptographic protocols / Cryptographic hash functions

An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption J. Wu∗ and D.R. Stinson† David R. Cheriton School of Computer Science University of Waterloo, Waterloo, ON, Canada {j32wu, dstinson}@uwate

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-15 09:30:41
752Cryptographic protocols / Network architecture / Data / Virtual private networks / OpenVPN / Security appliance / Network security / Internet Key Exchange / IPsec / Computer network security / Computing / Tunneling protocols

securepoint10brochure:00 Uhr Seite 1

Add to Reading List

Source URL: www.securepoint.cc

Language: English - Date: 2009-10-09 10:58:04
753Secure communication / Electronic commerce / Cryptography / Internet / Internet standards / Transport Layer Security / Vulnerability / Payment Card Industry Data Security Standard / Dynamic SSL / Cryptographic protocols / Computing / Internet protocols

INFORMATION SUPPLEMENT Migrating from SSL and Early TLS Version 1.0 Date: April 2015 Author: PCI Security Standards Council

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-04-15 10:20:24
754Computer network security / Internet protocols / Tunneling protocols / Virtual private networks / Cryptographic protocols / OpenVPN / Unified threat management / IPsec / Transport Layer Security / Computing / System software / Software

Security with Passion www.endian.com E n d i a n UTM V i rtu a l A p p l i a n c e Endian UTM Virtual Appliance

Add to Reading List

Source URL: www.endian.com

Language: English - Date: 2015-04-09 11:35:41
755Computing / Cryptographic hash functions / Hashing / SHA-2 / Internet protocols / HMAC / Bouncy Castle / SHA-1 / IPsec / Cryptography / Error detection and correction / Cryptographic software

Bouncy Castle FIPS Java API 1 MayIntroduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2015-05-08 17:24:41
756Cloud infrastructure / Cryptographic protocols / Secure communication / Internet protocols / Apache Hadoop / Cloudera / Microsoft Certified Professional / HTTP Secure / Lightweight Directory Access Protocol / Computing / Software / Cloud computing

Cloudera Manager Administration Guide

Add to Reading List

Source URL: www.cloudera.com

Language: English - Date: 2015-04-19 16:20:06
757Federated identity / Identity management / Cryptographic protocols / Digital identity / Authentication / Identity / Security / Computer security

Privacy and Identity Management for Life Lifelong Privacy > 100 years: The world will change a lot and, in particular, ICT will change – and each individual’s appreciation of privacy will change several times

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2010-08-18 04:11:00
758Security / Cyberwarfare / Electronic commerce / Secure communication / Espionage / Extended Validation Certificate / Certificate authority / Public key certificate / CA/Browser Forum / Key management / Public-key cryptography / Cryptographic protocols

Trustwave EV Validation Guide (2)_01January2011_TW legal arl

Add to Reading List

Source URL: ventraip.com.au

Language: English - Date: 2014-04-16 01:20:35
759Internet protocols / Password / Challenge-response authentication / Inter-Asterisk eXchange / MD5 / Replay attack / Man-in-the-middle attack / Computer network security / Cryptographic hash functions / Computer security / Cryptography / Cyberwarfare

iSEC Security Whitepaper IAX Voice Over-IP Security 1 Written by Zane Lackey and Himanshu Dwivedi iSEC Partners is a information security

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
760Cryptographic protocols / Data / Internet protocols / Computer network security / Virtual private networks / IPsec / Internet Key Exchange / Layer 2 Tunneling Protocol / Point-to-Point Tunneling Protocol / Computing / Network architecture / Tunneling protocols

Vol Vol III III -- IPSec-based IPSec-based VPNs VPNs

Add to Reading List

Source URL: ellistalks.com

Language: English - Date: 2009-12-01 10:56:31
UPDATE