Shared secret

Results: 29



#Item
1

IPV - A Well Kept Secret An article by Carol Anderson. IPV - A Well Kept Secret by Carol Anderson Some secrets are meant to be kept; others are meant to be shared. While at the recent Families of SMA conference, I had th

Add to Reading List

Source URL: www.curesma.org

- Date: 2015-04-30 12:03:59
    2--  -- The Evolution of the Kerberos Authentication Service John T. Kohl

    -- -- The Evolution of the Kerberos Authentication Service John T. Kohl

    Add to Reading List

    Source URL: www.cs.fsu.edu

    Language: English - Date: 2004-04-08 15:18:56
    3Secure Protocol Composition Anupam Datta John C. Mitchell Ante Derek Dusko Pavlovic

    Secure Protocol Composition Anupam Datta John C. Mitchell Ante Derek Dusko Pavlovic

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:11
    4ITW2003, Paris, France, March 31 – April 4, 2003  Construction of a Shared Secret Key Using Continuous Variables Jean Cardinal, Gilles Van Assche Universit´e Libre de Bruxelles B-1050 Brussels, Belgium

    ITW2003, Paris, France, March 31 – April 4, 2003 Construction of a Shared Secret Key Using Continuous Variables Jean Cardinal, Gilles Van Assche Universit´e Libre de Bruxelles B-1050 Brussels, Belgium

    Add to Reading List

    Source URL: gva.noekeon.org

    Language: English - Date: 2013-02-27 15:26:38
      5Secure Calls & Messages Best practice cryptography Peer-to-peer communication Maximum security Superior voice quality

      Secure Calls & Messages Best practice cryptography Peer-to-peer communication Maximum security Superior voice quality

      Add to Reading List

      Source URL: www.crypttalk.com

      Language: English - Date: 2015-02-20 10:27:12
      6Regular features | Ethics  Keeping secrets – or not When and why client confidences may need to be shared. by Stafford Shepherd Keeping a secret or a confidence is an important part of what we

      Regular features | Ethics Keeping secrets – or not When and why client confidences may need to be shared. by Stafford Shepherd Keeping a secret or a confidence is an important part of what we

      Add to Reading List

      Source URL: www.qls.com.au

      Language: English
      7The GCHQ Protocol and its Problems Ross Anderson, Michael Roe Cambridge University Computer Laboratory Pembroke Street, Cambridge CB2 3QG Email: (rja14,mrr)@cl.cam.ac.uk

      The GCHQ Protocol and its Problems Ross Anderson, Michael Roe Cambridge University Computer Laboratory Pembroke Street, Cambridge CB2 3QG Email: (rja14,mrr)@cl.cam.ac.uk

      Add to Reading List

      Source URL: www.chiark.greenend.org.uk

      Language: English - Date: 2010-08-20 09:24:43
      8Microsoft Word - Design of hybrid protocol-in password-based three-party key exchange settting.doc

      Microsoft Word - Design of hybrid protocol-in password-based three-party key exchange settting.doc

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2006-11-29 06:14:31
      9draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

      draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

      Add to Reading List

      Source URL: tools.ietf.org

      Language: English - Date: 2015-04-26 16:01:52
      10Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk  Abstract. Bitcoin is

      Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk Abstract. Bitcoin is

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-04-03 08:37:15