Key-agreement protocol

Results: 124



#Item
51Random oracle / Authenticated encryption / Communications protocol / Key-agreement protocol / Cryptography / Cryptographic protocols / Password-authenticated key agreement

Conditions of Use 1) Disclaimer, Attribution and Copyright acknowledgement a) Any publication of Bureau tide predictions must acknowledge copyright in the Material in the Commonwealth of Australia represented by the Bure

Add to Reading List

Source URL: www.bom.gov.au

Language: English - Date: 2014-12-03 18:01:45
52Random oracle / Authenticated encryption / Communications protocol / Key-agreement protocol / Cryptography / Cryptographic protocols / Password-authenticated key agreement

Key Establishment: Proofs and Refutations Kim-Kwang Raymond CHOO Bachelor of Science in Mathematics - Dec 2000 Bachelor of Applied Science (Hons) Industrial and Applied Maths - May 2002 Master of Information Technology -

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:11:18
53Information / Internet Security Association and Key Management Protocol / IPsec / Oakley protocol / KMP / Cisco PIX / IPv4 / Cryptographic protocols / Data / Computing

Cisco PIX Interoperability Guide Copyright © [removed], bww bitwise works GmbH.. All Rights Reserved. The use and copying of this product is subject to a license agreement. Any other use is strictly prohibited. No part

Add to Reading List

Source URL: www.bitwiseworks.com

Language: English - Date: 2014-02-25 08:50:47
54Bluetooth / Wireless / Key-agreement protocol / Authentication / Man-in-the-middle attack / Advanced Encryption Standard / Cryptography / Technology / Cryptographic protocols

Bypassing Passkey Authentication in Bluetooth Low Energy (extended abstract) Tomáš Rosa [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-23 07:35:21
55Data / Internet protocols / Tunneling protocols / Routing / FreeS/WAN / IPsec / Internet Security Association and Key Management Protocol / Injoy / Subnetwork / Network architecture / Cryptographic protocols / Computing

Linux FreeS/WAN Interoperability Guide Copyright © [removed], bww bitwise works GmbH.. All Rights Reserved. The use and copying of this product is subject to a license agreement. Any other use is strictly prohibited. N

Add to Reading List

Source URL: www.bitwiseworks.com

Language: English - Date: 2014-02-25 08:50:47
56Password / Key management / Challenge-response authentication / Needham–Schroeder protocol / Known-plaintext attack / Kerberos / Key / RSA / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:11:55
57Computing / Key-agreement protocol / Authentication protocol / Authenticator / Secure channel / IEEE 802.1X / Password-authenticated key agreement / Cryptographic protocols / Data / Information

Secure Key Establishment for Mobile Networks by Yiu Shing Terry Tin Bachelor of Information Technology

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:10:13
58Key size / Whitfield Diffie / Public-key cryptography / Key-agreement protocol / Advanced Encryption Standard / Diffie–Hellman problem / Index of cryptography articles / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:57
59Password-authenticated key agreement / Transmission Control Protocol / Data / Applied mathematics / Information / Cryptographic protocols / XTR / NP

CS355: Topics in cryptography Fall 2007 Assignment #2 Due: Wednesday, Dec. 5, 2007.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-12-25 03:13:40
60Revocation list / Certificate policy / Verisign / Public key certificate / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Key management

GATEKEEPER ABN-DSC SUBSCRIBER AGREEMENT

Add to Reading List

Source URL: gatekeeper.esign.com.au

Language: English - Date: 2010-06-15 22:56:03
UPDATE