Key exchange

Results: 1226



#Item
141

To appear in the Proceedings of the Third International Conference on Information Technology: New Generations 1 Efficient Authenticated Key-Exchange for Devices with a Trusted Manager∗ He Ge

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-10 01:21:45
    142IPsec / Cryptographic protocols / Virtual private networks / Computer network security / Cryptographic software / StrongSwan / Internet Key Exchange / FreeS/WAN / OpenWrt / Openswan / IPv6 / Raspberry Pi

    Die strongSwan Open Source VPN Lösung Open Source Trend Days 2013 Steinfurt www.strongswan.org

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2013-09-25 06:25:19
    143Cryptography / Abstract algebra / Algebra / Finite fields / Public-key cryptography / Computational hardness assumptions / Group theory / DiffieHellman key exchange / Index calculus algorithm / RSA / Discrete logarithm / Elliptic curve cryptography

    E-th roots and static Diffie-Hellman using index calculus Antoine Joux1 Joint work with Reynald Lercier2 , David Naccache3 , Emmanuel Thome´ 4 Elliptic Curve Cryptography 2008

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2008-10-04 13:47:14
    144Computer security / Computing / Cryptography / Computer network security / Trusted computing / IPsec / Cryptographic software / Cryptographic protocols / StrongSwan / Trusted Network Connect / IF-MAP / Internet Key Exchange

    The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2012-08-29 15:32:53
    145Computing / Network architecture / Internet protocols / Tunneling protocols / Cryptographic protocols / Computer networking / Networking hardware / 6WIND / Data Plane Development Kit / IPsec / Open vSwitch / Internet Key Exchange

    Powering The New Generation Of IPsec Gateways

    Add to Reading List

    Source URL: www.6wind.com

    Language: English - Date: 2014-07-22 11:54:51
    146Cryptography / Password / Security / Computer access control / Key / Authentication / Password Authenticated Key Exchange by Juggling / Zero-knowledge password proof

    LOGO_SECURITYANDTRUSTE_RUSH_36

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-19 12:51:00
    147Computing / Cryptography / Network architecture / Cryptographic protocols / Computer network security / IPsec / Internet protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Online Certificate Status Protocol

    Microsoft PowerPoint - LinuxTag2008_Flyer_VPN_Solution.ppt

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2008-06-25 02:51:57
    148

    LNCSA Modular Framework for Multi-Factor Authentication and Key Exchange

    Add to Reading List

    Source URL: manulis.eu

    Language: English - Date: 2015-03-31 12:18:23
      149

      暗号プロトコル評価対象の概要 独立行政法人 情報通信研究機構 1.プロトコル名:IKE-SIG 2.関連する標準:RFC2409: “The Internet Key Exchange (IKE),” Internet

      Add to Reading List

      Source URL: crypto-protocol.nict.go.jp

      Language: Japanese - Date: 2015-10-20 00:24:04
        150Cryptography / Public-key cryptography / Key management / E-commerce / RSA / Key / DiffieHellman key exchange / Digital signature / X.509 / Key size / RSA numbers

        Ron was wrong, Whit is right Maxime Augier1 , 1

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2012-02-17 08:49:04
        UPDATE