Cryptographic protocols

Results: 3642



#Item
891Key management / Internet protocols / Internet standards / Online Certificate Status Protocol / OCSP stapling / X.509 / Revocation list / Certificate authority / Public key certificate / Cryptography / Public-key cryptography / Cryptographic protocols

Towards Short-Lived Certificates Emin Topalovic∗ , Brennan Saeta∗ , Lin-Shung Huang† , Collin Jackson† and Dan Boneh∗ ∗ Stanford University, {emint, saeta, dabo}@cs.stanford.edu † Carnegie Mellon University

Add to Reading List

Source URL: www.w2spconf.com

Language: English - Date: 2012-05-24 01:30:01
892Secure communication / Data / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / Cipher suite / SSL acceleration / HTTP Secure / Cryptography / Cryptographic protocols / Computing

The Design and Implementation of Protocol-Based Hidden Key Recovery Eu-Jin Goh1 , Dan Boneh1 , Benny Pinkas2 , and Philippe Golle1 1 Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-07-21 17:54:06
893Electronic commerce / Cyberwarfare / Computer security / Cryptographic protocols / Root certificate / X.509 / Public key certificate / Entrust / Certificate authority / Public-key cryptography / Key management / Security

Entrust Certificates Update

Add to Reading List

Source URL: www.frbservices.org

Language: English - Date: 2012-05-07 16:17:48
894Secure communication / Internet protocols / Cryptographic protocols / System software / Internet standards / Transport Layer Security / Cipher suite / OpenSSL / SHA-2 / Software / Cryptographic software / Computing

SSLデフォルト設定の調査 - サーバ編 - 付録1 Cipher Suite

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-08-05 01:02:35
895Cryptographic protocols / Networking hardware / Wireless security / Technology / Electronics / Network security / Wireless router / Home network / Router / Wi-Fi / Computing / Computer network security

Wireless Home Networking Quick Reference Guide Wireless Home Networking Wireless Home Networking service lets you connect multiple PCs, laptops, gaming consoles, tablets and other wireless devices throughout your home

Add to Reading List

Source URL: mm.mygrande.com

Language: English - Date: 2012-07-04 06:58:59
896Cryptographic protocols / Internet protocols / Internet standards / Computer network security / Multihoming / Host Identity Protocol / Internet Key Exchange / IPv4 / Transmission Control Protocol / Network architecture / Computing / Data

Network Working Group Request for Comments: 5201 Category: Experimental R. Moskowitz ICSAlabs

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2008-04-18 18:59:39
897Secure communication / Key management / Public-key cryptography / Electronic commerce / HTTP Secure / Transport Layer Security / Stunnel / SSL acceleration / Load balancing / Cryptography / Computing / Cryptographic protocols

Recent work in OpenBSD relayd SSL Interception and other Advancements Reyk Floeter () March 2013 Abstract

Add to Reading List

Source URL: www.openbsd.dk

Language: English - Date: 2013-04-02 16:02:24
898Public-key cryptography / Internet privacy / Alice and Bob / Simple Mail Transfer Protocol / Oblivious transfer / Pretty Good Privacy / Needham–Schroeder protocol / Index of cryptography articles / Cryptography / Email / Cryptographic protocols

A Certified E-Mail Protocol Bruce Schneier Counterpane Systems James Riordan

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
899Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

IKEv2&VPN&with&OpenBSD&iked(8) EuroBSDCon&2010@10@09,&Karlsruhe Reyk&Flöter&() Agenda • Why&another&VPN&protocol?

Add to Reading List

Source URL: www.openbsd.dk

Language: English - Date: 2012-12-20 07:31:37
900Cryptographic software / Internet protocols / Internet standards / Secure Shell / OpenSSH / Ssh-keygen / Telnet / File Transfer Protocol / Virtual Network Computing / Software / Computing / System software

SSH - Uncrackable Adam B. GurnoContents 1 License

Add to Reading List

Source URL: gurno.com

Language: English - Date: 2005-10-07 10:24:42
UPDATE