Key exchange

Results: 1226



#Item
921Computer network security / MQV / Diffie–Hellman key exchange / Authentication / AKA / Cryptography / Cryptographic protocols / Public-key cryptography

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 186–200. A New Key Exchang

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
922Medical informatics / International standards / Email / Electronic health record / Health Information Systems Programme / Personal health record / Health information exchange / Public key certificate / Health information technology / Health / Health informatics / Medicine

The Direct Project Scalable, cost-effective, secure transport of patient health information via the internet The Direct Project was launched in March 2010 as an open government project guided by the Office of the Nationa

Add to Reading List

Source URL: www.tn.gov

Language: English - Date: 2013-05-22 10:33:20
923Law / Financial accounting / Government / United States securities law / EDGAR / Filing / Central Index Key / Securities Act / Notice of electronic filing / SEC filings / United States Securities and Exchange Commission / Finance

DRAFT EDGAR Filer Manual (Volume I) - General Information (Version 14)

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2012-09-28 14:28:50
924Finite fields / Logarithms / Computational hardness assumptions / Group theory / Diffie–Hellman problem / Index calculus algorithm / Discrete logarithm / XTR / Elliptic curve cryptography / Abstract algebra / Cryptography / Mathematics

The Past, evolving Present and Future of Discrete Logarithm Antoine Joux, Andrew Odlyzko and Cécile Pierrot Abstract The first practical public key cryptosystem ever published, the Diffie-Hellman key exchange algorithm,

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2014-06-04 21:00:21
925Diffie–Hellman key exchange / Station-to-Station protocol / Diffie–Hellman problem / Key-agreement protocol / XTR / Advantage / Random self-reducibility / Public-key cryptography / Oracle machine / Cryptography / Cryptographic protocols / MQV

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 156–172. About the Securit

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
926Cryptographic hash functions / Password-authenticated key agreement / One-way function / Password / Trapdoor function / RSA / Zero-knowledge proof / Random oracle / Isomorphism / Cryptography / Cryptographic protocols / Public-key cryptography

LNCS 3152 - <Emphasis FontCategory="SansSerif" Type="Bold">IPAKE</Emphasis>: Isomorphisms for Password-Based Authenticated Key Exchange

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
927Public-key cryptography / Diffie–Hellman key exchange / Communications protocol / Key-agreement protocol / Oracle machine / Random oracle / Cryptography / Cryptographic protocols / Advantage

An extended abstract of this work appeared in: The 4th International Conference on Autonomic and Trusted Computing (ATC ’07) (July 11–[removed], Hong-Kong, China) B. Xiao, L. T. Yang, J. Ma, C. Muller-Schloer and Y. Hu

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
928Computer security / Software / Companies listed on the New York Stock Exchange / Database security / Database activity monitoring / Database / Vulnerability / Guardium /  an IBM Company / Host Based Security System / Computing / Database management systems / McAfee

Business Brief Secure Your Databases for Sustainable SOX Compliance Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:09
929Computer network security / Network architecture / Tunneling protocols / Virtual private networks / Internet privacy / Aruba Networks / IPsec / Internet Key Exchange / Windows / Computing / Computer architecture / Cryptographic protocols

ArubaRemoteNetworkingSolution_FL

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2012-11-09 22:39:16
930Note / Staff / Mensural notation / Accidental / Key signature / Transposing instrument / Neume / Rhythm / Time signature / Music / Musical notation / Clef

Plaine & Easie Code This version of the code is being maintained by the International Association of Music Libraries and the Répertoire International des Sources Musicales in order to be adopted as an exchange format in

Add to Reading List

Source URL: www.iaml.info

Language: English - Date: 2014-06-13 05:39:18
UPDATE