Public-key cryptography

Results: 11378



#Item
831Computing / Cryptography / Computer security / Computer network security / Cyberwarfare / Password / Denial-of-service attack / Firewall / SOAP / Authentication / Public-key cryptography / Internet security

Evidence-Based Access Control for Ubiquitous Web Services Nishith Khantal IIT, Kanpur

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
832Wireless networking / Technology / Computing / IEEE 802.11 / Wi-Fi / Encryption / Public-key cryptography / Bluetooth / Wireless

Proposal for EU legislation Mandatory anonymised, authenticated and end-to-end encrypted communications in all tele­pho­ny and computing devices sold after 201x. Status: DRAFT 0.13

Add to Reading List

Source URL: youbroketheinternet.org

Language: English - Date: 2015-09-29 18:17:30
833Cryptography / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Certificate authority / Root certificate / Public key certificate / HTTPS / DigiNotar

Analysis of the HTTPS Certificate Ecosystem Zakir Durumeric, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan

Add to Reading List

Source URL: zakird.com

Language: English
834Cryptography / Public-key cryptography / Electronic documents / Dining cryptographers problem / Communications protocol / Crowds / Email / Group signature / Anonymity / Anonymous remailer / Digital signature

Selectively Traceable Anonymity Luis von Ahn1 , Andrew Bortz2 , Nicholas J. Hopper3 , and Kevin O’Neill4 1 Carnegie Mellon University, Pittsburgh, PA USA 2

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2006-10-27 09:31:40
835Cryptography / Key management / Public-key cryptography / Public key infrastructure / Transport Layer Security / Certification Practice Statement / Certificate policy / Public key certificate / Revocation list / Professional certification / Root certificate / Authentication

CERTIFICATION PRACTICE STATEMENT (CPS) Published by eMudhra Limited 3rd Floor, Sai Arcade, Outer Ring Road, Devarabeesanahalli Bengaluru, Karnataka, India

Add to Reading List

Source URL: www.e-mudhra.com

Language: English - Date: 2015-06-30 02:40:54
836Transport Layer Security / Key management / Public key infrastructure / Public-key cryptography / Certificate authority / Public key certificate / Root certificate / Extended Validation Certificate / X.509 / Online Certificate Status Protocol / Self-signed certificate / DNS-based Authentication of Named Entities

Accountable Key Infrastructure (AKI): ∗ A Proposal for a Public-Key Validation Infrastructure Tiffany Hyun-Jin Kim Lin-Shung Huang Adrian Perrig Collin Jackson Virgil Gligor CyLab / Carnegie Mellon University

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
837Cryptography / Computing / Software / Security / Computer security / Password / Internet privacy / Public-key cryptography / Web application / Data Protection API / Dynamic SSL

Private Use of Untrusted Web Servers via Opportunistic Encryption

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
838Internet / Domain name system / Computing / Network architecture / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Name server / Time to live

./by-Rlt--prod-all-zn-lt-ttl.eps

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English - Date: 2009-12-09 11:21:49
839Computing / Internet / Domain name system / Network architecture / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / Name server / Root name server

Validating Caching Resolver Wouter Wijngaards (NLnet Labs) http://www.nlnetlabs.nl/ © May 2008 Stichting NLnet Labs

Add to Reading List

Source URL: unbound.nlnetlabs.nl

Language: English - Date: 2008-05-19 08:09:35
840Cryptography / Computer security / Computing / Computer access control / Notary / Public-key cryptography / Identity management / Direct Anonymous Attestation / Password / Internet Relay Chat / Security token / Proxy server

BNymble (a short paper) More anonymous blacklisting at almost no cost Peter Lofgren and Nicholas Hopper University of Minnesota Abstract. Anonymous blacklisting schemes allow online service providers

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2010-12-16 18:40:43
UPDATE