Cryptographic protocols

Results: 3642



#Item
921Diffie–Hellman key exchange / RSA / XTR / Password / Key / Secure Remote Password protocol / Password-authenticated key agreement / Cryptography / Cryptographic protocols / SPEKE

Secure Sessions from Weak Secrets Michael Roe1 Bruce Christianson2 David Wheeler3 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:39
922Cryptographic protocols / Internet protocols / Internet standards / Keystore / Public-key cryptography / Lightweight Directory Access Protocol / Authentication / Security token / Digest access authentication / Cryptography / Computing / Security

Oracle GlassFish Server Security Guide ReleaseE24940-01 February 2012

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-04-09 12:56:08
923Internet protocols / Computer network security / Information / TCP/IP / Secure communication / Tcpcrypt / Transmission Control Protocol / Secure Shell / Wireless security / Cryptographic protocols / Computing / Data

The case for ubiquitous transport-level encryption Andrea Bittau Stanford Michael Hamburg Stanford

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-06-02 14:19:01
924Remote administration software / Internet protocols / Computing / System software / Internet standards / Internet privacy / Secure Shell / Cryptographic software / Internet

GSW Business Tunnel Example L02

Add to Reading List

Source URL: www.georgiasoftworks.com

Language: English - Date: 2015-02-03 15:01:59
925Computing / Password-authenticated key agreement / Diffie–Hellman key exchange / XTR / Diffie–Hellman problem / File Transfer Protocol / Password / Password Authenticated Key Exchange by Juggling / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol ? SeongHan Shin1 , Kazukuni Kobara1 , and Hideki Imai2,1 1 Research Center for Information Security (RCIS),

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-21 19:36:43
926Cryptographic protocols / Revocation list / Public key certificate / X.509 / Extended Validation Certificate / Certificate authority / Online Certificate Status Protocol / Phishing / Root certificate / Cryptography / Public-key cryptography / Key management

C:/Users/zhdong/Dropbox/Papers/SVN/certificates/TPRC14/TPRC14_v5.dvi

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2014-09-05 20:41:02
927IP / Complexity classes / Commitment scheme / Soundness / Challenge-response authentication / NP / Alice and Bob / Black box / Communications protocol / Cryptography / Cryptographic protocols / Zero-knowledge proof

Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy Vipul Goyal∗ UCLA and MSR India Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-23 06:25:21
928Network architecture / Cryptographic software / Internet standards / Remote administration software / Telnet / Secure Shell / Port / BoKS / Internet protocols / Internet / Computing

GSW Business Tunnel Example L01

Add to Reading List

Source URL: www.georgiasoftworks.com

Language: English - Date: 2015-02-03 15:01:59
929Learning management systems / Educational technology / Cryptographic protocols / Secure communication / HTTP / Moodle / Session hijacking / Password / Virtual learning environment / Learning / Software / Educational software

International Journal of Information Technology and Knowledge Management January-June 2011, Volume 4, No. 1, ppINVESTIGATION ON SECURITY IN LMS MOODLE Sheo Kumar1 & Kamlesh Dutta2

Add to Reading List

Source URL: www.csjournals.com

Language: English - Date: 2010-10-19 00:34:09
930Formal methods / Computability theory / Lambda calculus / Polynomial / Π-calculus / IP / Process calculus / Function / PP / Theoretical computer science / Mathematics / Applied mathematics

A PROBABILISTIC POLYNOMIAL-TIME PROCESS CALCULUS FOR THE ANALYSIS OF CRYPTOGRAPHIC PROTOCOLS JOHN C. MITCHELL, AJITH RAMANATHAN, ANDRE SCEDROV, AND VANESSA TEAGUE Abstract. We prove properties of a process calculus that

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:35:24
UPDATE