Key exchange

Results: 1226



#Item
161Cryptography / Public-key cryptography / Notary / E-commerce / XTR / RSA / Digital signature / Zero-knowledge proof / Blacklist / Proof of knowledge / DiffieHellman key exchange / Internet Relay Chat

PDF Document

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2010-08-16 11:41:06
162

暗号プロトコル評価対象の概要 独立行政法人 情報通信研究機構 1.プロトコル名:IKEv2 2.関連する標準:RFC5996: “Internet Key Exchange Protocol Version 2 (IKEv

Add to Reading List

Source URL: crypto-protocol.nict.go.jp

Language: Japanese - Date: 2015-10-20 00:24:04
    163Learning with errors / RSA / Ideal lattice cryptography / Index of cryptography articles / Cryptography / Cryptographic protocols / Password-authenticated key agreement

    Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2009-09-07 10:57:44
    164Wireless email / Data synchronization / Email / Personal information managers / Microsoft Exchange Server / Microsoft Office 365 / Microsoft Office / Microsoft Outlook / Push email / Software / Computing / Groupware

    DATA SHEET KEY BENEFITS NO PLUG-INS REQUIRED Acumatica’s Exchange integration is compatible with Exchange

    Add to Reading List

    Source URL: acumaticawwwsite-acumaticainc.netdna-ssl.com

    Language: English - Date: 2015-06-21 10:46:00
    165Data / Network architecture / Tunneling protocols / Internet protocols / Internet Key Exchange / Virtual private networks / IPsec / Check Point / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Computer network security

    Chapter 5 Advanced VPN Concepts and Tunnel Monitoring Solutions in this chapter:

    Add to Reading List

    Source URL: scitechconnect.elsevier.com

    Language: English - Date: 2015-03-19 08:13:14
    166RSA / ElGamal encryption / Diffie–Hellman key exchange / Homomorphic encryption / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptography / Public-key cryptography / Cryptographic protocols

    An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2013-02-05 01:02:43
    167Economy of Norway / Norway / Statkraft / European Energy Exchange / Economy of Europe

    Q1 Interim Report Q1/2015 Statkraft AS Key figures

    Add to Reading List

    Source URL: www.statkraft.nl

    Language: English - Date: 2015-05-05 09:09:44
    168Republics / Europe / Education / Asia / Higher education / European Higher Education Area / Moldova / European University Association / Armenia / Landlocked countries / Member states of the Commonwealth of Independent States / Member states of the United Nations

    Project CHANGE THROUGH EXCHANGE: Fostering university autonomy and financial sustainability in Armenia, Moldova and Ukraine Universities are important pools of expertise and key players in developing a country’s human

    Add to Reading List

    Source URL: www.athena-tempus.eu

    Language: English - Date: 2013-12-12 10:01:49
    169Numismatics / Virtual economy / Payment systems / Foreign exchange market / International economics / Bitcoin / Electronic money / Virtual currency / Local currency / Money / Currency / Economics

    FATF REPORT Virtual Currencies Key Definitions and Potential AML/CFT Risks

    Add to Reading List

    Source URL: www.bancaditalia.it

    Language: English
    170

    NEW ZEALAND EXCHANGE LIMITED Key Notes • • •

    Add to Reading List

    Source URL: www.nzx.com

    - Date: 2008-10-22 15:54:00
      UPDATE