Key exchange

Results: 1226



#Item
581Cryptographic protocols / ID-based encryption / Public key infrastructure / Digital signature / ElGamal encryption / Diffie–Hellman key exchange / Semantic security / Cryptography / Public-key cryptography / Key management

Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia2,1 , Stanislaw Jarecki1, and Gene Tsudik1 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
582Data / StrongSwan / Internet Key Exchange / IPsec / X.509 / RADIUS / Online Certificate Status Protocol / EAP-SIM / Virtual private network / Cryptographic protocols / Computing / Cryptography

Microsoft PowerPoint - LinuxTag2008_Flyer_VPN_Solution.ppt

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2008-06-25 02:51:57
583Information / StrongSwan / Internet Key Exchange / IPsec / Openswan / FreeS/WAN / Virtual private network / Netlink / Cisco Systems VPN Client / Cryptographic protocols / Computing / Data

Linux Kongress 2009 Dresden IKEv2-based VPNs using strongSwan Prof. Dr. Andreas Steffen [removed]

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2009-10-28 04:31:17
584Network architecture / StrongSwan / Internet Key Exchange / IPsec / FreeRADIUS / RADIUS / EAP-SIM / Virtual private network / Extensible Authentication Protocol / Cryptographic protocols / Computing / Data

Microsoft PowerPoint - LinuxTag2009_Flyer_VPN_Solution.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2009-06-21 15:09:29
585Internet Protocol / Tunneling protocols / Internet protocols / Cryptographic protocols / Teredo tunneling / IPsec / User Datagram Protocol / Internet Key Exchange / Network architecture / Internet / IPv6

Xbox One Technical information on P2P Networking Behavior Version 1.0 Last updated: October 6, 2013 Many gaming and app scenarios on Xbox® One rely on low-latency peer-to-peer (P2P) networking capabilities. The platfor

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-10-07 13:27:07
586Network architecture / StrongSwan / Internet Key Exchange / IPsec / FreeS/WAN / Openswan / IPv6 / Hochschule für Technik Rapperswil / Virtual private network / Cryptographic protocols / Computing / Cantons of Switzerland

Die strongSwan Open Source VPN Lösung Open Source Trend Days 2013 Steinfurt www.strongswan.org

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2013-09-25 06:25:19
587Quantum information science / Quantum key distribution / Key-agreement protocol / Internet Key Exchange / IPsec / BB84 / Man-in-the-middle attack / Internet Security Association and Key Management Protocol / Alice and Bob / Cryptography / Cryptographic protocols / Quantum cryptography

Quantum Cryptography in Practice Chip Elliott Dr. David Pearson Dr. Gregory Troxel

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2003-07-24 11:26:24
588Integer sequences / Finite fields / Public-key cryptography / Cryptographic protocols / Prime number / Richard Schroeppel / Quadratic sieve / Diffie–Hellman key exchange / RSA / Mathematics / Cryptography / Abstract algebra

The Evolution of Public Key Cryptography Martin E. Hellman Crypto ’99 Santa Barbara, CA August 18, 1999 ADD: Loren Kohnfelder and certificates

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-06-15 12:59:08
589Data / Computer network security / Internet protocols / Tunneling protocols / Network Address Translation / StrongSwan / Internet Key Exchange / IPsec / NAT traversal / Cryptographic protocols / Network architecture / Computing

Microsoft PowerPoint - LinuxTag2008_Flyer_Mediation_Service.ppt

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2008-06-25 02:53:22
590Block cipher / Cryptanalysis / Hellman / Differential cryptanalysis / Tiger / Diffie–Hellman key exchange / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
UPDATE