Interlock protocol

Results: 10



#Item
1Cryptography / Cryptographic protocols / Public-key cryptography / Internet protocols / DiffieHellman key exchange / NeedhamSchroeder protocol / Communications protocol / Key exchange / Protocol composition logic / Interlock protocol

Journal of Computer Security–482 IOS Press 423 A derivation system and compositional logic

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:12
2Cryptographic protocols / Hashing / Replay attack / Security token / RSA / SHA-1 / Trusted timestamping / Interlock protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Automatic Event-Stream Notarization Using Digital Signatures Bruce Schneier John Kelsey

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
3Information / ZRTP / MIKEY / Interlock protocol / Cryptographic protocols / Cryptography / Data

Microsoft Word - paper-strint-johnston.docx

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
4Information / Man-in-the-middle attack / Interlock protocol / Out-of-band / Communications protocol / Transport Layer Security / Authentication / Streaming media / Computing / Cryptographic protocols / Data

ABSTRACT Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE:

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-12-05 17:18:58
5Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Password / Man-in-the-middle attack / XTR / IEEE P1363 / Public-key cryptography / Interlock protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / SPEKE

Cryptanalysis of the Dragony Key Exchange Protocol Dylan Clarke, Feng Hao ∗

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2013-06-26 17:27:57
6Cryptographic protocols / Internet / Cypherpunks / Internet protocols / Steven M. Bellovin / Firewall / Distributed firewall / Interlock protocol / Matt Blaze / Computing / Computer network security / Cryptography

Microsoft Word - DEC00029673.doc

Add to Reading List

Source URL: sonysuit.com

Language: English - Date: 2012-05-24 13:45:17
7Cryptographic protocols / Internet / Cypherpunks / Internet protocols / Steven M. Bellovin / Firewall / Distributed firewall / Interlock protocol / Matt Blaze / Computing / Computer network security / Cryptography

Microsoft Word - DEC00029673.doc

Add to Reading List

Source URL: www.sonysuit.com

Language: English - Date: 2012-05-24 13:45:17
8Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-05-03 16:10:02
9Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: www.stanford.edu

Language: English - Date: 2006-03-21 17:10:20
10Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2006-03-21 17:10:20
UPDATE