Cryptographic protocols

Results: 3642



#Item
861Ubiquitous computing / Smart card / Alice and Bob / Chip and PIN / Debit card / Transaction authentication number / IP / Technology / Computing / Payment systems / Cryptographic protocols / ISO standards

Keep your enemies close Distance bounding against smartcard relay attacks Computer Laboratory Saar Drimer and Steven J. Murdoch

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:54
862Key management / Cryptographic protocols / Access control / Secure communication / Two-factor authentication / Password / Authentication / Transport Layer Security / Certificate authority / Cryptography / Security / Public-key cryptography

Usable Privacy and Security Introduction to Security January 26, 2006 Michael Reiter Notes By: Sasha Romanosky

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-01-26 22:28:13
863Internet / Cryptographic software / Internet protocols / Secure Shell / Proxy server / Port forwarding / SOCKS / IP address / Tunneling protocol / Computing / Internet privacy / Network architecture

GSW Business Tunnel Example D03

Add to Reading List

Source URL: www.georgiasoftworks.com

Language: English - Date: 2015-02-03 15:01:59
864Cryptographic protocols / HTTP / Web 2.0 / Web development / Internet protocols / Transmission Control Protocol / Hypertext Transfer Protocol / URI scheme / Communications protocol / Computing / Internet / Data

draft-ietf-httpbis-http2-17 - Hypertext Transfer Protocol version 2

Add to Reading List

Source URL: tools.ietf.org

Language: English
865Internet / Network architecture / Internet standards / HTTP / HTTP Secure / Load balancing / Transport Layer Security / Application delivery controller / SSL acceleration / Cryptographic protocols / Secure communication / Computing

Recent  work  in  OpenBSD  relayd AsiaBSDCon  2013 Reyk  Flöter  () ライクフローター Agenda

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2013-04-02 16:02:24
866IEEE 802.11 / Wireless networking / Stream ciphers / RC4 / Wired Equivalent Privacy / Initialization vector / Wireless access point / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Cryptographic protocols / Computer network security

Analysis ofSecurity or Wired Equivalent Privacy Isn’t Nikita Borisov, Ian Goldberg, and David Wagner

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 04:44:47
867Cryptographic protocols / Electronic commerce / Cryptographic hash function / Key / RSA / Hash function / Secret sharing / Password / Challenge-response authentication / Cryptography / Key management / Public-key cryptography

Environmental Key Generation towards Clueless Agents James Riordan? School of Mathematics University of Minnesota Minneapolis, MN 55455

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
868Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Public-key cryptography / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Abstract

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
869Smart card / Public-key cryptography / Challenge-response authentication / Pirate decryption / Cryptography / Cryptographic protocols / Secure multi-party computation

Making Privacy-Preserving Data Mining Practical with Smartcards∗ Andrew Y. Lindell† January 20, 2009 Abstract

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
870Cryptographic protocols / Hashing / Replay attack / Security token / RSA / SHA-1 / Trusted timestamping / Interlock protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Automatic Event-Stream Notarization Using Digital Signatures Bruce Schneier John Kelsey

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
UPDATE