Secure channel

Results: 85



#Item
21Public-key cryptography / Secure channel / Commitment / Universal composability / Cryptography / Cryptographic protocols / Commitment scheme

BRICS Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: Universally Composable Commitments with Constant Expansion Factor Perfect Hiding and Perfect Binding

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-11-06 08:55:18
22

A Secure Channel for Attribute-Based Credentials [Short Paper] ∗ Gergely Alpár

Add to Reading List

Source URL: www.cs.ru.nl

- Date: 2013-10-23 11:07:56
    23

    Security Advisory Microsoft Secure Channel (Schannel) Vulnerability (CVEDetails OpenText is aware of and has been carefully monitoring the recent news surrounding the Microsoft Secure Channel (Schannel) Vulne

    Add to Reading List

    Source URL: techsupport.gxs.com

    - Date: 2014-11-18 08:55:19
      24Technology / Brand management / Companies listed on the New York Stock Exchange / Imation

      STORAGE SOLUTIONS CHANNEL PROGRAM ARCHIVE SECURE

      Add to Reading List

      Source URL: i.crn.com

      Language: English - Date: 2015-04-07 09:52:03
      25Channel Tunnel / GB Railfreight / DB Schenker Rail / GSM-R / Direct Rail Services / Network Rail / Cab Secure Radio / Signalman / Transport / Rail transport / Land transport

      The rail industry’s confidential reporting system Freight Operation Reports Periods 12 toFebruary - 31 March 2013)

      Add to Reading List

      Source URL: www.ciras.org.uk

      Language: English - Date: 2013-04-12 07:00:30
      26Applied mathematics / Process calculi / Π-calculus / Lambda calculus / Valuation / Function / Curry–Howard correspondence / Holomorphic functional calculus / Mathematics / Theoretical computer science / Abstract algebra

      Secure Implementations of Typed Channel Abstractions (Extended Abstract) Michele Bugliesi Marco Giunti

      Add to Reading List

      Source URL: www.dsi.unive.it

      Language: English - Date: 2009-01-23 08:18:42
      27Public-key cryptography / Diffie–Hellman key exchange / Key-agreement protocol / Key management / Virtual synchrony / XTR / Key exchange / Secure channel / SPEKE / Cryptographic protocols / Information / Computing

      On the Performance of Group Key Agreement Protocols  Yair Amir 

      Add to Reading List

      Source URL: www.cnds.jhu.edu

      Language: English - Date: 2013-09-18 16:37:35
      28Network performance / Covert channel / Steganography / Overt channel / Measuring network throughput / Transmission Control Protocol / IPv4 / Network packet / Time to live / Computer architecture / Computing / Network architecture

      CCHEF – Covert Channels Evaluation Framework User Manual Version 0.1 Sebastian Zander {} May 21, 2008 Abstract Communication is not necessarily made secure by the use of encryption alone. The mere ex

      Add to Reading List

      Source URL: caia.swin.edu.au

      Language: English - Date: 2008-05-20 22:39:30
      29Side channel attack / Diffie–Hellman key exchange / Advantage / Public-key cryptography / Semantic security / Cryptography / Cryptographic protocols / Random oracle

      Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda1 1 Colin Boyd3

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-04-14 00:49:04
      30Networking hardware / ESCON / FICON / Adapter pattern / Network interface controller / Expansion card / Adapter / EMC Symmetrix / Computer hardware / Computing / Fibre Channel

      CCA-3074 Console Concentrator A channel attached Console Appliance providing secure local and remote console solutions for IBM Mainframe processors. The CCA-3074 can also act as a console access backup when OSA-ICC acces

      Add to Reading List

      Source URL: www.visara.com

      Language: English - Date: 2014-11-24 11:38:11
      UPDATE