Forward secrecy

Results: 40



#Item
21Infrastructure Security  1. Infrastructure Security Forward Secrecy In this report, we discuss points to note regarding memory forensics for devices equipped with large amounts

Infrastructure Security 1. Infrastructure Security Forward Secrecy In this report, we discuss points to note regarding memory forensics for devices equipped with large amounts

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2014-03-27 22:27:18
22One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-22 12:08:05
23Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, and Duncan S. Wong Department of Computer Science City University of Hong Kong

Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, and Duncan S. Wong Department of Computer Science City University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-13 00:19:02
24Two Remarks on Public Key Cryptology Ross Anderson University of Cambridge Computer Laboratory, New Museums Site, Pembroke Street, Cambridge CB2 3QG, UK

Two Remarks on Public Key Cryptology Ross Anderson University of Cambridge Computer Laboratory, New Museums Site, Pembroke Street, Cambridge CB2 3QG, UK

Add to Reading List

Source URL: cypherspace.org

Language: English - Date: 2003-11-23 22:40:31
25February[removed]Perfect Forward Secrecy Introduction 1.

February[removed]Perfect Forward Secrecy Introduction 1.

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2015-02-10 18:11:48
26PART2 International Standards and Way Forward 6

PART2 International Standards and Way Forward 6

Add to Reading List

Source URL: www.nd.gov.hk

Language: English - Date: 2009-07-02 23:19:13
27NRL Release Number[removed]Formalizing GDOI Group Key Management Requirements in NPATRL ∗

NRL Release Number[removed]Formalizing GDOI Group Key Management Requirements in NPATRL ∗

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:02:45
28One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model Florian Bergsma, Tibor Jager, and J¨org Schwenk Horst G¨ ortz Institute for IT Security

One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model Florian Bergsma, Tibor Jager, and J¨org Schwenk Horst G¨ ortz Institute for IT Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 19:28:13
29Opportunistic Keying as a Countermeasure to Pervasive Monitoring Stephen Kent BBN Technologies Abstract This document was prepared as part of the IETF response to concerns about “pervasive monitoring” (PM) [Farrell-p

Opportunistic Keying as a Countermeasure to Pervasive Monitoring Stephen Kent BBN Technologies Abstract This document was prepared as part of the IETF response to concerns about “pervasive monitoring” (PM) [Farrell-p

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
30Configuring SSL Securely    With recent revelations about state sponsored intelligence gathering efforts I wanted to capitalize  on our attention to them and suggest a way we, as IT professio

Configuring SSL Securely    With recent revelations about state sponsored intelligence gathering efforts I wanted to capitalize  on our attention to them and suggest a way we, as IT professio

Add to Reading List

Source URL: www.alaska.edu

Language: English - Date: 2014-06-09 20:08:57