Key exchange

Results: 1226



#Item
121

To appear in the Proceedings of the Third International Conference on Information Technology: New Generations 1 Efficient Authenticated Key-Exchange for Devices with a Trusted Manager∗ He Ge

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-10 01:21:45
    122

    LNCSSufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange

    Add to Reading List

    Source URL: manulis.eu

    Language: English - Date: 2013-02-24 12:04:02
      123

      A Modular Framework for Multi-Factor Authentication & Key Exchange Nils Fleischhacker, Mark Manulis, Amir Azodi SSR 2014@RHUL

      Add to Reading List

      Source URL: ssr2015.com

      Language: English - Date: 2015-06-22 06:35:19
        124

        Threshold Password-Authenticated Key Exchange Philip MacKenzie∗ Bell Laboratories Lucent Technologies Murray Hill, NJUSA

        Add to Reading List

        Source URL: web.cecs.pdx.edu

        Language: English - Date: 2009-09-29 10:16:44
          125Cryptography / Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size

          Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

          Add to Reading List

          Source URL: aaspring.com

          Language: English - Date: 2015-08-21 16:58:21
          126Computing / Cryptography / Network architecture / IPsec / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / StrongSwan / Internet Key Exchange / Opportunistic encryption / NAT traversal

          Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

          Add to Reading List

          Source URL: www.strongswan.org

          Language: English - Date: 2006-04-27 10:23:08
          127

          Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Douglas Stebila Queensland University of Technology joint work with Joppe Bos (NXP),

          Add to Reading List

          Source URL: files.douglas.stebila.ca

          Language: English - Date: 2015-01-08 11:24:26
            128Computing / Cryptography / Computer network security / Computer security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol

            The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

            Add to Reading List

            Source URL: www.strongswan.org

            Language: English - Date: 2010-06-11 08:24:10
            129

            28 Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols M. CHOUDARY GORANTLA, Infosys Ltd., India ´

            Add to Reading List

            Source URL: manulis.eu

            Language: English - Date: 2014-10-27 13:11:21
              130Computing / Cryptography / Computer network security / Network architecture / IPsec / Cryptographic protocols / Virtual private networks / Tunneling protocols / StrongSwan / Internet Key Exchange

              VPN with Mobile Devices revisited 55. DFN Betriebstagung Oktober 2011 Berlin Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications HSR Hochschule für Technik Rapperswil

              Add to Reading List

              Source URL: www.strongswan.org

              Language: English - Date: 2011-10-24 00:14:43
              UPDATE