Secure communication

Results: 3134



#Item
851Data / Computing / Two-way radio / Email encryption / Voice over IP / Telecommunication / Communications protocol / Secure communication / Secure multicast / Internet privacy / Project 25 / Electronics

One-Way Cryptography Sandy Clark Travis Goodspeed Perry Metzger

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2011-08-20 14:32:00
852Password / Secure communication / Tor / Software / Network Security & Cryptography / Caesar cipher / Internet privacy / Espionage / Cryptography

PDF Document

Add to Reading List

Source URL: www.merkle.com

Language: English - Date: 2010-07-18 17:32:42
853Commitment scheme / Zero-knowledge proof / Oblivious transfer / Secure two-party computation / Proof of knowledge / Communication complexity / IP / Polynomial / Homomorphic encryption / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† May 4, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-04 07:57:36
854Cryptographic software / Secure communication / Computing / Internet / Internet standards / Cipher suite / Transport Layer Security / Camellia / MatrixSSL / Cryptography / Cryptographic protocols / Internet protocols

  CycloneSSL is a lightweight SSL/TLS implementation targeted for use by embedded application developers. It

Add to Reading List

Source URL: www.oryx-embedded.com

Language: English - Date: 2015-01-25 07:33:55
855Wireless networking / Computing / Computer network security / Technology / Secure communication / Wi-Fi Protected Access / Ralink / Linksys / IEEE 802.11i-2004 / Cryptographic protocols / Cryptography / IEEE 802.11

Microsoft Word - smxWiFi.doc

Add to Reading List

Source URL: www.coressentinc.com

Language: English - Date: 2013-06-08 18:09:00
856Data security / Internet privacy / Key escrow / Key / Information security / Secure communication / Clipper chip / Man-in-the-middle attack / Disk encryption / Cryptography / Key management / Public-key cryptography

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4

Add to Reading List

Source URL: www.cdt.org

Language: English - Date: 2013-04-29 10:36:57
857Ethics / Cyberwarfare / Computer network security / Data breach / Secure communication / Internet privacy / Personally identifiable information / Privacy / Notification system / Security / Computer security / Data security

Microsoft Word - NR -airbest II.doc

Add to Reading List

Source URL: www.oipc.ab.ca

Language: English - Date: 2011-05-16 12:16:37
858Internet protocols / Data / Secure communication / Public-key cryptography / Internet standards / Transport Layer Security / Cipher suite / HTTP Secure / GnuTLS / Cryptography / Cryptographic protocols / Computing

It Is Time to Redesign Transport Layer Security Francisco Corella, PhD Karen Lewison, MD

Add to Reading List

Source URL: pomcor.com

Language: English - Date: 2014-01-12 22:33:51
859Cryptography / Data / Computing / Internet standards / Cipher suite / Transport Layer Security / TLS-PSK / Public-key cryptography / HTTP Secure / Cryptographic protocols / Internet protocols / Secure communication

1 DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose Luis

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 07:49:31
860Data / Information / Secure communication / Internet standards / Electronic commerce / Transport Layer Security / Authentication protocol / Cipher suite / Password authentication protocol / Cryptographic protocols / Cryptography / Internet protocols

Generic Compilers for Authenticated Key Exchange∗ Tibor Jager Florian Kohlar Sven Sch¨age

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-02 08:15:58
UPDATE