Key exchange

Results: 1226



#Item
591National security / Computing / Public safety / Inter-process communication / Virtual synchrony / Key management / Computer security / Diffie–Hellman key exchange / Key-agreement protocol / Cryptographic protocols / Security / Crime prevention

High-Performance Secure Group Communication by Cristina Nita-Rotaru

Add to Reading List

Source URL: www.dsn.jhu.edu

Language: English - Date: 2013-09-20 16:47:28
592Diffie–Hellman key exchange / Hellman / Whitfield Diffie / Public-key cryptography / Finite field / Key exchange / Cryptography / Cryptographic protocols / Diffie–Hellman problem

DELARAM KAHROBAEI, City University of New York, City Tech and Graduate Center Public key exchange using extensions by endomorphisms and matrices over a Galois field I am presenting a joint work with H.T.Lam and V.Shpilra

Add to Reading List

Source URL: cms.math.ca

Language: English - Date: 2013-11-01 09:18:01
593Key management / Electronic commerce / RSA / Secret sharing / Digital signature / Verifiable secret sharing / Diffie–Hellman key exchange / Proactive secret sharing / Full Domain Hash / Cryptography / Public-key cryptography / Cryptographic protocols

Further Simplifications in Proactive RSA Signatures StanisÃlaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
594Virtual private network / Cyberwarfare / Internet Key Exchange / Handover / Wireless security / Computer network security / Computing / Technology

(Example of cover and title page)

Add to Reading List

Source URL: www.li.mahidol.ac.th

Language: English - Date: 2010-12-24 03:48:16
595Data / Computer network security / Trusted computing / Internet protocols / StrongSwan / Trusted Network Connect / IF-MAP / Trusted Computing Group / Internet Key Exchange / Computer security / Computing / Cryptographic protocols

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2012-08-29 15:32:53
596Information / StrongSwan / Internet Key Exchange / IPsec / Openswan / FreeS/WAN / Virtual private network / Netlink / Cryptographic protocols / Computing / Data

LinuxTag 2010 Berlin strongSwan News Prof. Dr. Andreas Steffen [removed] Martin Willi

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 06:38:12
597Data / StrongSwan / Internet Key Exchange / IPsec / Virtual private network / Multihoming / Cryptographic protocols / Computing / Network architecture

VPN with Mobile Devices revisited 55. DFN Betriebstagung Oktober 2011 Berlin Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications HSR Hochschule für Technik Rapperswil

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2011-10-24 00:14:43
598Data / Computer network security / Internet privacy / Tunneling protocols / Cisco IOS / Internet Key Exchange / IPsec / Virtual private network / Cisco Systems / Computing / Cryptographic protocols / Network architecture

Cisco IOS Certificate Enrollment Using Enhanced Enrollment Commands Configuration Example Document ID: 27860 Contents Introduction

Add to Reading List

Source URL: www.cisco.com

Language: English
599Key management / Group Domain of Interpretation / Diffie–Hellman key exchange / Perfect forward secrecy / XTR / Key distribution / Internet Security Association and Key Management Protocol / IPsec / Cryptography / Cryptographic protocols / Public-key cryptography

NRL Release Number[removed]Formalizing GDOI Group Key Management Requirements in NPATRL ∗

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 11:02:45
600CIX / Routing / Wide area networks / Peering / Internet exchange point / Commercial Internet eXchange / Akamai Technologies / Internet / Network architecture / Computing

DE-CIX New York Turns Up Akamai as First Internet Exchange Customer Akamai chooses DE-CIX New York carrier-neutral exchange as key part of U.S. peering solution New York – May 12, 2014 – DE-CIX North America, the U.S

Add to Reading List

Source URL: press.de-cix.net

Language: English - Date: 2014-05-29 15:22:41
UPDATE