Cryptographic software

Results: 2705



#Item
231Scripting languages / Cryptographic protocols / Secure communication / Firefox / Google Chrome / JavaScript / Transport Layer Security / Opera / Mobile application development / Software / Web browsers / Portable software

A First Look at Firefox OS Security Daniel DeFreez∗ , Bhargava Shastry† , Hao Chen∗ , Jean-Pierre Seifert† ∗ University of California, Davis {dcdefreez, chen}@ucdavis.edu

Add to Reading List

Source URL: www.mostconf.org

Language: English - Date: 2014-05-17 09:18:10
232Secure communication / Computing / Internet protocols / Security / Internet standards / Transport Layer Security / Cipher suite / GnuTLS / HTTP Secure / Cryptography / Cryptographic protocols / Cryptographic software

2013 IEEE Symposium on Security and Privacy Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan∗ , C´edric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , Pierre-Yves Strub‡ ∗ IN

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:46
233Software / Cryptographic software / Tor / Relay / Guard / Prison Break: The Final Break / Anonymity / Internet privacy / Electromagnetism / Electrical engineering

Better guard rotation parameters Roger Dingledine Tor Tech ReportAugust 20, 2011

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2012-08-30 03:15:12
234Cryptographic protocols / Computing / GnuTLS / Internet protocols / Secure communication / Internet standards / Comparison of TLS Implementations / TLS-SRP / Cryptographic software / System software / Cryptography

Introduction to GnuTLS Simon Josefsson http://josefsson.org/ http://www.gnutls.org/

Add to Reading List

Source URL: josefsson.org

Language: English - Date: 2012-09-11 01:52:01
235System software / Computer architecture / Content-control software / Fortinet / Windows Server / Cryptographic protocols / Application firewall / Windows / IPsec / Computer network security / Computing / Tunneling protocols

FortiClientTM Endpoint Security Application FortiClient is an all-in-one comprehensive security solution that extends the power of FortiGate’s unified threat management to endpoints on your network. Desktops, laptops,

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:13
236Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security

FortiToken -300 TM One-Time Password Token Strong Authentication at your Fingertips The FortiToken-300 product comprises a hardware token (FortiToken-300 PKI USB

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:10
237Cryptographic software / Internet privacy / Tor / Compendium / Software / Notetaking software / Computing

Microsoft Word - Compendium.IntroExerciseGuide.v1.3.4.doc

Add to Reading List

Source URL: compendiuminstitute.net

Language: English - Date: 2011-11-07 10:50:49
238RSA / Optimal asymmetric encryption padding / Denotational semantics / ElGamal encryption / Cryptographic hash function / Random oracle / XTR / Function / Digital signature / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆ Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
239Software / Computing / Disk encryption / Cryptographic software / System software

ELECTRONIC REPORTING  All holder reports MUST be filed electronically and be in the NAUPA accepted format. No paper reports will be accepted.  CREATE. You have several options to create your NAUPA accepted format:

Add to Reading List

Source URL: treasury.tn.gov

Language: English - Date: 2015-03-25 10:21:02
240Mathematical logic / Model theory / Proof of knowledge / Functions and mappings / IP / Zero-knowledge proof / Structure / Functor / Soundness / Mathematics / Cryptographic protocols / Logic

A Machine-Checked Formalization of Sigma-Protocols Gilles Barthe, Daniel Hedin, Santiago Zanella B´eguelin IMDEA Software, Madrid, Spain {Gilles.Barthe, Daniel.Hedin, Santiago.Zanella}@imdea.org Abstract—Zero-knowled

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
UPDATE