Public-key cryptography

Results: 11378



#Item
821Message authentication codes / Public-key cryptography / Public key infrastructure / RSA / BurrowsAbadiNeedham logic / XTR

Pattern-Matching Spi-Calculus∗ Christian Haack Security of Systems Group Faculty of Science, Radboud University Postbus 9010, 6500 GL Nijmegen, The Netherlands

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:41:03
822Software / System software / Computing / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Unbound / Uninstaller / Start menu

Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, May 2015 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,

Add to Reading List

Source URL: unbound.nlnetlabs.nl

Language: English - Date: 2015-05-20 02:41:14
823Public-key cryptography / E-commerce / Pseudorandom number generators / Key management / Cryptography / RSA / Entropy / Key / Internet

Internet-Wide Scanning and its Measurement Applications Zakir Durumeric University of Michigan RIPE 68 - Measurement, Analysis and Tools Working Group

Add to Reading List

Source URL: zakird.com

Language: English
824Secure communication / Cryptographic protocols / Cryptographic software / Public-key cryptography / Internet Standards / Cipher suite / X.509 / Netscape / Transport Layer Security

SSL: Paved With Good Intentions

Add to Reading List

Source URL: www.westpoint.ltd.uk

Language: English - Date: 2015-10-01 10:06:33
825Cryptography / Protocol composition logic / Authentication protocols / BurrowsAbadiNeedham logic / Communications protocol / Kerberos / Public-key cryptography / Cryptographic protocol

A. Datta et al. / Protocol Composition Logic 1 Protocol Composition Logic Anupam DATTA a , John C. MITCHELL b , Arnab ROY b and

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:08
826Risk management / Safety engineering / Key management / Public key infrastructure / Public-key cryptography / Window cleaner / Occupational safety and health / Accreditation / Reporting of Injuries /  Diseases and Dangerous Occurrences Regulations / Public key certificate / Institution of Occupational Safety and Health / Safety

FWC Safety Accredited Member (SAM) Questionnaire Level one = Sole Trader Member Name: FWC Membership No:

Add to Reading List

Source URL: www.f-w-c.co.uk

Language: English - Date: 2015-01-08 06:50:00
827Cryptography / Hashing / Error detection and correction / Public-key cryptography / Search algorithms / Digital signature / Cryptographic hash function / Post-quantum cryptography / RSA / Hash function / Merkle tree / MD5

SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2014-10-04 10:08:48
828

Mathematical background Public-key cryptosystems Public-key cryptography Based on slides of Prof. Bart Preneel

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-08-26 10:47:16
    829Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

    SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:14
    830Cryptography / Public-key cryptography / Routing / Network architecture / Digital signature / Records management technology / Signature / IP routing / PKD / Internet protocol suite / Communications protocol

    Mechanized Network Origin and Path Authenticity Proofs Fuyuan Zhang Limin Jia CyLab, CMU

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:12
    UPDATE