Forward secrecy

Results: 40



#Item
31Configuring SSL Securely    With recent revelations about state sponsored intelligence gathering efforts I wanted to capitalize  on our attention to them and suggest a way we, as IT professio

Configuring SSL Securely    With recent revelations about state sponsored intelligence gathering efforts I wanted to capitalize  on our attention to them and suggest a way we, as IT professio

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2014-06-09 20:08:57
32Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-06-16 10:55:54
33International Workshop on Security – Proceedings of IWSEC ’07 (October 29–[removed], Nara, Japan) A. Miyaji, H. Kikuchi and K. Rannenberg, Eds. Springer-Verlag, LNCS 4752, pages 292–307. On Security Models and Comp

International Workshop on Security – Proceedings of IWSEC ’07 (October 29–[removed], Nara, Japan) A. Miyaji, H. Kikuchi and K. Rannenberg, Eds. Springer-Verlag, LNCS 4752, pages 292–307. On Security Models and Comp

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
34A Cryptographic Analysis of OPACITY ¨ ur Dagdelen Ozg¨ Marc Fischlin Tommaso Gagliardoni Giorgia Azzurra Marson

A Cryptographic Analysis of OPACITY ¨ ur Dagdelen Ozg¨ Marc Fischlin Tommaso Gagliardoni Giorgia Azzurra Marson

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-22 11:29:49
35[removed]April 2013 International Event on “STRENGTHENING THE FIGHT AGAINST TAX FRAUD AND TAX EVASION; STATE OF PLAY AND THE WAY FORWARD”

[removed]April 2013 International Event on “STRENGTHENING THE FIGHT AGAINST TAX FRAUD AND TAX EVASION; STATE OF PLAY AND THE WAY FORWARD”

Add to Reading List

Source URL: www.vm.fi

Language: English - Date: 2013-04-29 08:50:35
36An Experimental Study of TLS Forward Secrecy Deployments Lin-Shung Huang∗ , Shrikant Adhikarla† , Dan Boneh‡ , Collin Jackson∗ Mellon University, {linshung.huang, collin.jackson}@sv.cmu.edu † Microsoft, shrikan

An Experimental Study of TLS Forward Secrecy Deployments Lin-Shung Huang∗ , Shrikant Adhikarla† , Dan Boneh‡ , Collin Jackson∗ Mellon University, {linshung.huang, collin.jackson}@sv.cmu.edu † Microsoft, shrikan

Add to Reading List

Source URL: www.linshunghuang.com

Language: English - Date: 2014-04-16 17:21:09
37Overview of Key Agreement Protocols Ratna Dutta and Rana Barua Stat-Math Unit

Overview of Key Agreement Protocols Ratna Dutta and Rana Barua Stat-Math Unit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-10-04 07:51:24
38Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,

Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-03 02:55:34
39

PDF Document

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2005-05-17 17:24:40