Cryptographic protocol

Results: 1374



#Item
1

Bancor Protocol Continuous Liquidity for Cryptographic Tokens through their Smart Contracts Eyal Hertzog, Guy Benartzi, Galia Benartzi Edit and Mathematical Formulation by Omri Ross

Add to Reading List

Source URL: storage.googleapis.com

Language: English - Date: 2018-04-02 02:01:50
    2

    A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-01-18 13:44:36
      3

      Constraint Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly Shmatikov Computer Science Laboratory, SRI International, Menlo Park, CAUSA fmillen,

      Add to Reading List

      Source URL: jonmillen.com

      Language: English - Date: 2017-01-20 09:49:12
        4

        Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

        Add to Reading List

        Source URL: jeapostrophe.github.io

        - Date: 2018-04-03 12:30:31
          5Computing / Internet / Cryptographic protocols / Secure communication / Network architecture / Hypertext Transfer Protocol / Internet security / HTTPS / Crimeware / Internet privacy / Transport Layer Security / Bolt

          Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

          Add to Reading List

          Source URL: rich.recoil.org

          Language: English - Date: 2006-04-19 14:01:38
          6Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation

          Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

          Add to Reading List

          Source URL: work.debayangupta.com

          Language: English - Date: 2014-06-25 08:00:47
          7Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

          Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

          Add to Reading List

          Source URL: systempay.cyberpluspaiement.com

          Language: English - Date: 2015-12-16 04:48:58
          8Cryptography / Transport Layer Security / Public key infrastructure / Public-key cryptography / Key management / Cryptographic protocols / Online Certificate Status Protocol / Certificate authority / Public key certificate / Revocation list / Heartbleed / HTTPS

          Leveraging DNS for timely SSL Certificate Revocation Eirini Degkleri1,2 , Antonios A. Chariton1 , Panagiotis Ilia1,2 Panagiotis Papadopoulos1,2 , Evangelos P. Markatos1,2 FORTH-ICS, Greece University of Crete, Greece 1

          Add to Reading List

          Source URL: womencourage.acm.org

          Language: English - Date: 2016-08-09 09:13:43
          9Cryptography / Mathematical analysis / Quantum complexity theory / Computational complexity theory / Functions and mappings / Secure multi-party computation / Communication complexity / Secure two-party computation / Limit of a function / Cryptographic protocol / Pi / PP

          Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk

          Add to Reading List

          Source URL: cs-www.cs.yale.edu

          Language: English - Date: 2006-09-25 10:55:42
          10Cryptography / Computing / Hypertext Transfer Protocol / Key management / Cryptographic protocols / Secure communication / HTTP cookie / Transport Layer Security / Public-key cryptography / Encryption / Key / Session

          Robert L. Bogue MS MVP, MCSE, MCSA:SecurityPerformance Improvement:

          Add to Reading List

          Source URL: www.thorprojects.com

          Language: English - Date: 2015-07-23 13:05:22
          UPDATE