Cryptographic protocols

Results: 3642



#Item
871Data / Tunneling protocols / Internet protocols / Computer network security / Virtual private networks / Internet Key Exchange / IPsec / OpenVPN / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Network architecture

OpenIKED Reyk Floeter () February 2013 Abstract This paper introduces the OpenIKED project[14], the latest portable subproject of OpenBSD[13].

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2013-04-02 16:02:23
872Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

IKEv2&VPN&with&OpenBSD&iked(8) EuroBSDCon&2010@10@09,&Karlsruhe Reyk&Flöter&() Agenda • Why&another&VPN&protocol?

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2012-12-20 07:31:37
873Computer architecture / Cryptographic protocols / Secure communication / Windows / Form / HTTP Secure / Server / Computing / Windows Server / Software

Controlapp online help Hussein Shafie February 16, 2015 XMLmind Controlapp online help

Add to Reading List

Source URL: www.xmlmind.com

Language: English - Date: 2015-02-15 02:58:19
874Secure communication / Key management / Public-key cryptography / Electronic commerce / HTTP Secure / Transport Layer Security / Stunnel / SSL acceleration / Load balancing / Cryptography / Computing / Cryptographic protocols

Recent work in OpenBSD relayd SSL Interception and other Advancements Reyk Floeter () March 2013 Abstract

Add to Reading List

Source URL: openbsd.aise.re

Language: English - Date: 2013-04-02 16:02:24
875Cryptographic protocols / Online Certificate Status Protocol / X.509 / OMA DRM / Revocation list / Public key certificate / PKCS / Rights Object Acquisition Protocol / Public key infrastructure / Cryptography / Public-key cryptography / Key management

Microsoft Word - CMLA-Technical-Specification-V1Approved.docx

Add to Reading List

Source URL: www.cm-la.com

Language: English - Date: 2014-01-09 13:17:00
876Computer network security / Cryptographic protocols / Key management / ISO standards / Ubiquitous computing / Kerberos / Key distribution center / Smart card / Authentication / Cryptography / Security / Computer security

Security implications in Kerberos by the introduction of smart cards Nikos Mavrogiannopoulos Andreas Pashalidis

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
877Representational state transfer / Software architecture / Key management / OAuth / Cryptographic software / Secure communication / Transport Layer Security / Data Protection API / Cloud standards / Computing / Internet protocols

RESTful SecurityW2SP Dan Forsberg Nokia Research Center & Helsinki University of Technology (HUT)

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:05
878Data / Internet standards / Extensible Messaging and Presence Protocol / Online chat / Digest access authentication / Simple Authentication and Security Layer / URI scheme / CRAM-MD5 / SMTP Authentication / Computing / Cryptographic protocols / Internet

XEP-0078: Non-SASL Authentication Peter Saint-Andre mailto: xmpp: https://stpeter.im

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 12:57:57
879Internet / Secure communication / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Secure Shell / Cipher suite / HTTP Secure / Cryptographic protocols / Computing / Network architecture

Opportunistic Encryption Everywhere Adam Langley Google Inc San Francisco, California

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
880Data / Internet standards / Internet / Secure communication / Cryptographic software / Kerberos / Cryptographic protocols / Internet protocols / Computing

KMIP C Client SDK Complete vendor-independent key management solution 01010101100100101101001101110010101011010101010 KEY MANAGEMENT

Add to Reading List

Source URL: www.cryptsoft.com

Language: English - Date: 2015-04-27 12:14:08
UPDATE