Secure transmission

Results: 298



#Item
21Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation

Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-24 16:43:48
22Adkins / Transmission Control Protocol

Secure Internet Indirection Infrastructure (I3) Dan Adkins UC Berkeley January 14, 2003

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2003-01-17 18:11:13
23Cryptographic software / Secure Shell / Internet Standards / Internet protocols / Cross-platform software / Nmap / OpenSSH / Hping / Telnet / Comparison of SSH clients / File Transfer Protocol / Transmission Control Protocol

Fotis Hantzis Website Email sock-raw.org

Add to Reading List

Source URL: sock-raw.org

Language: English - Date: 2015-10-18 14:42:59
24Internet protocols / Internet Standards / Internet security / Secure communication / Network performance / Transmission Control Protocol / Transport layer / Internet protocol suite / Out-of-order delivery / Tor / Stream Control Transmission Protocol / Hypertext Transfer Protocol

Reducing Latency in Tor Circuits with Unordered Delivery Michael F. Nowlan, David Wolinsky, and Bryan Ford Yale University Abstract Tor, the popular anonymous relay tool, incurs significant latency costs—partly due to

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-07-21 06:56:10
25Cryptography / Secure multi-party computation / Secure two-party computation / Communication complexity / Commitment scheme / Oblivious transfer / Cryptographic protocol / XTR / Transmission Control Protocol

Covert Two-Party Computation Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PANicholas Hopper

Add to Reading List

Source URL: hunch.net

Language: English - Date: 2005-03-01 11:04:04
26Internet Standards / Internet protocols / Internet security / Secure communication / Dark web / Tor / Transmission Control Protocol / Internet privacy / Internet Relay Chat / Padding

Google Summer of Code Proposal: A Framework for Website Fingerprinting Countermeasures   Marc Juarez Miro ()

Add to Reading List

Source URL: securehomes.esat.kuleuven.be

Language: English - Date: 2014-04-22 05:29:47
27Internet security / Internet Standards / Internet protocols / Secure communication / Dark web / IP hijacking / Tor / Border Gateway Protocol / Traffic analysis / Denial-of-service attack / Transmission Control Protocol

RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2015-03-17 04:19:13
28

Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes Yvo Desmedt1,2 Stelios Erotokritou1

Add to Reading List

Source URL: 2010.africacrypt.com

Language: English - Date: 2010-05-27 06:39:52
    29Internet privacy / Secure communication / Computer networking / Cryptographic protocols / Transport Layer Security / Proxy server / Transmission Control Protocol / HTTPS / Internet protocol suite / Session Initiation Protocol

    Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

    Add to Reading List

    Source URL: irtf.org

    Language: English - Date: 2016-01-05 05:04:04
    30Cryptographic protocols / Secure communication / Internet protocols / Transport Layer Security / Network protocols / Transmission Control Protocol / HTTPS / Ciphertext indistinguishability / Initialization vector / Hypertext Transfer Protocol / Block cipher mode of operation / Keystream

    This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

    Add to Reading List

    Source URL: jhalderm.com

    Language: English - Date: 2015-11-02 11:01:00
    UPDATE