Public-key cryptography

Results: 11378



#Item
631Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Secure communication / Key server / Man-in-the-middle attack / Public key certificate / Certificate authority / Anonymity / HTTPS

Verifying Public Keys without Trust: How Anonymity Can Guarantee Data Integrity Lachlan J. Gunn, Andrew Allison, Derek Abbott arXiv:1602.03316v1 [cs.CR] 10 Feb 2016

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2016-02-10 20:40:16
632Cryptography / Public-key cryptography / Cryptocurrencies / Key management / Public key infrastructure / Alternative currencies / Bitcoin / Public key certificate / Digital signature / Key / Multisignature / CryptoNote

Smart Signatures A White Paper from Rebooting the Web of Trust by Christopher Allen, Greg Maxwell, Peter Todd, Ryan Shea, Pieter Wuille, Joseph Bonneau, Joseph Poon, and Tyler Close

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
633Cryptography / Computer security / Security / E-commerce / Identity management / Computer access control / Amsterdam-Oost / Security Assertion Markup Language / Nikhef / PERMIS / Public key certificate / Password

AARC-SA1 CILogon pilot: user certificates behind the scenes Mischa Sall´e Tamas Balogh David Groep

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-05-25 04:07:21
634Cryptography / Public key infrastructure / Public-key cryptography / Key management / Cryptographic protocols / Transport Layer Security / Public key certificate / X.509 / DocuSign / Online Certificate Status Protocol / SCVP / Authentication

    DocuSign  Confidential    

Add to Reading List

Source URL: certificates.docusign.com

Language: English - Date: 2014-02-20 15:11:45
635Cryptography / Public-key cryptography / Commitment scheme / Cryptographic hash function / CramerShoup cryptosystem / RSA / Crypt / Digital signature

This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
636Cryptography / Computing / Software / Hypertext Transfer Protocol / Transport Layer Security / Secure communication / Cryptographic protocols / HTTP Strict Transport Security / HTTP Public Key Pinning / HTTP cookie / HTTPS / Browser security

Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning Michael Kranch Joseph Bonneau

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-07-30 05:47:43
637Cryptography / Key management / Public key infrastructure / Groupware / Internet forum / Online chat / Social information processing / CA/Browser Forum / Certificate authority / Quorum

Microsoft Word - CA-Browser Forum Bylaws v. 1.0-Ballot-98.doc

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2015-07-07 18:40:43
638Cryptography / Pico / Public-key cryptography / Secret sharing / RSA / Secure cryptoprocessor / Cryptographic nonce / Password

1 Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices Oliver Stannard and Frank Stajano

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-06-23 18:45:47
639Sustainability / Cryptography / Natural environment / Environmental design / Energy policy / Sustainable building / Energy conservation / Sustainable architecture / Public key certificate / 2000-watt society / Green building / Lenzburg

www.2000watt.ch www.swissenergy.ch Greencity.Zürich, ZurichWatt Site

Add to Reading List

Source URL: www.2000watt.ch

Language: English - Date: 2015-08-10 03:53:44
640Cloud storage / Business continuity and disaster recovery / Data security / Disk encryption / Backup / Public-key cryptography / File system / Transparent Data Encryption / CTERA Networks

Data: Making it be there where you want it, and making it be gone when you want it gone Radia Perlman

Add to Reading List

Source URL: tce.technion.ac.il

Language: English - Date: 2015-06-21 01:59:30
UPDATE