Cryptographic protocols

Results: 3642



#Item
901Cryptographic protocols / Finite fields / Diffie–Hellman problem / Oblivious transfer / RSA / XTR / Decisional Diffie–Hellman assumption / Decision Linear assumption / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Computational hardness assumptions

Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green∗ Johns Hopkins University Susan Hohenberger† Johns Hopkins University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-14 14:00:36
902Data / Cryptography / Internet protocols / HTTP / Internet standards / TLS-SRP / Password / Transport Layer Security / Phishing / Cryptographic protocols / Secure communication / Computing

Is it too late for PAKE? John Engler UC Berkeley 1 Chris Karlof

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
903Security / Internet / Cryptographic protocols / Internet standards / Computer security / Wireless security / Encryption / Secure communication / Transport Layer Security / Computing / Internet privacy / Computer network security

The Ethics of Mobile Computing for Lawyers University of Richmond Law School of Law February 27, 2015

Add to Reading List

Source URL: jolt.richmond.edu

Language: English - Date: 2015-03-16 13:24:21
904Network architecture / Data / Tunneling protocols / Computer network security / IPsec / Security Parameter Index / Host Identity Protocol / Packet Processing / SPI / Internet protocols / Cryptographic protocols / Computing

Network Working Group Request for Comments: 5202 Category: Experimental P. Jokela Ericsson Research NomadicLab

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2008-04-18 18:59:08
905Data / Network architecture / Virtual private networks / Internet protocols / Computer network security / Internet Key Exchange / IPsec / StrongSwan / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Tunneling protocols

IKEv2&VPN&with&OpenBSD&iked(8) EuroBSDCon&2010@10@09,&Karlsruhe Reyk&Flöter&() Agenda • Why&another&VPN&protocol?

Add to Reading List

Source URL: openbsd.aise.re

Language: English - Date: 2012-12-20 07:31:37
906HTTP / Cryptographic protocols / Internet protocols / Internet standards / Network performance / Representational state transfer / World Wide Web / Reverse proxy / Transport Layer Security / Computing / Internet / Network architecture

RESTful Security Dan Forsberg Nokia Research Center Helsinki, Finland , Abstract— We take a look into the REST architectural style of

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
907HOTP / Cryptographic protocols / Hardware security module / PKCS / SecurID / Key Management Interoperability Protocol / One-time password / X Window System / PKCS11 / Cryptography / Internet protocols / Cryptography standards

Key Management SDKs Complete vendor-independent key management solution 01010101100100101101001101110010101011010101010 KEY MANAGEMENT

Add to Reading List

Source URL: www.cryptsoft.com

Language: English - Date: 2015-04-27 12:14:08
908Cryptographic protocols / Public-key cryptography / World Wide Web / HTTP / Key management / FOAF / Transport Layer Security / HTTP Secure / X.509 / Computing / Semantic Web / Internet

mod_authn_webid.c, mod_authz_webid.c

Add to Reading List

Source URL: dig.csail.mit.edu

Language: English - Date: 2011-02-01 14:35:35
909Information / Man-in-the-middle attack / Alice and Bob / Wide Mouth Frog protocol / Replay attack / Blind signature / Burrows–Abadi–Needham logic / Public-key cryptography / Communications protocol / Cryptography / Cryptographic protocols / Data

Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
910Internet standards / Internet protocols / FTP / Cryptographic protocols / Secure communication / Transport Layer Security / File Transfer Protocol / Comparison of FTP client software / HTTP Secure / Computing / Internet / Network architecture

Momentum Systems White Paper: Securing and Integrating File Transfers Over the Internet Securing and Integrating File Transfers Over the Internet

Add to Reading List

Source URL: www.momsys.com

Language: English - Date: 2012-03-26 15:32:48
UPDATE