Public-key cryptography

Results: 11378



#Item
681Domain name system / Internet / Computing / Network architecture / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Name server / Root name server / Time to live

Resolver Analysis for a Signed Root NLnet Labs documentversion 06. June 22, 2009 Abstract

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:52
682Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / E-commerce / Certificate authority / Certificate policy / Public key certificate / CA/Browser Forum / Online Certificate Status Protocol / Revocation list

Microsoft Word - CAB Forum BRdoc

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2016-02-01 11:58:08
683Computing / Internet / Internet Standards / Internet protocols / Software / Working groups / NLnet / DNSSEC / Public-key cryptography / NSD / Domain Name System Security Extensions / Rseaux IP Europens Network Coordination Centre

Stichting NLnet Labs, Annual Report 2005 Olaf M. Kolkman∗, NLnet Labs www.nlnetlabs.nl Chamber of Commerce Amsterdam, nrNLnet Labs document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:51
684Computing / Cryptography / Security / E-commerce / Mobile security / Bluetooth / Copyright law of the United States / Copyright / Public key infrastructure / Computer security

Mobile Application Security David Vo (Dvo) Dec 15, 2015 Copyright © 2015 nVisium LLC · www.nvisium.com

Add to Reading List

Source URL: nvisium.com

Language: English - Date: 2015-12-17 16:41:53
685Cryptography / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Cryptographic protocols / MD5 / Certificate authority / Public key certificate / HTTPS / Chain of trust / X.509

MD5 Considered Harmful Today Creating a rogue CA certificate Alexander Sotirov Marc Stevens Jacob Appelbaum Arjen Lenstra

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
686Computing / Internet / Internet Standards / Internet protocols / Network architecture / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Domain Name System / Hash table / Namespace

Design of a Secure and Decentralized Location Service for Agent Platforms B.J. Overeinder1 , M.A. Oey1 , R.J. Timmer1 , R. van Schouwen1 , E. Rozendaal2 , and F.M.T. Brazier1 1

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:52
687Cryptography / Public-key cryptography / Electric power / Microcontrollers / Smart grid / Smart meter / Electricity meter / Zero-knowledge proof / Commitment scheme / Digital signature / Elliptic curve cryptography / TI MSP430

Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers Andres Molina-Markham, George Danezis† , Kevin Fu, Prashant Shenoy, and David Irwin University of Massachusetts Amherst †

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:54
688Cryptography / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / E-commerce / Public key certificate / Certificate authority / Extended Validation Certificate / CA/Browser Forum / Revocation list / Certificate policy

Draft of Final Forum Guideline Version 1.0 Draft of November 19, 2015 CA/Browser Forum

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2015-12-03 16:13:10
689Cryptography / Certificate authority / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / English phonology

IdenTrust ACES Access Certificates for Electronic Services

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-03-09 18:45:16
690Elliptic curve cryptography / Public-key cryptography / Analytic number theory / Elliptic curve / Group theory / Mathematics

Non-generic attacks on elliptic curve DLPs Benjamin Smith Team GRACE INRIA Saclay–ˆIle-de-France ´ Laboratoire d’Informatique de l’Ecole

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-18 02:32:53
UPDATE