Springer Protocols

Results: 24



#Item
11Networking hardware / Server appliance / Network architecture / Wireless router / Home network / Modem / Network switch / Router / Computing / OSI protocols / Wi-Fi

Computer Supported Cooperative Work[removed]:277–299 DOI[removed]s10606[removed] © Springer[removed]The Home Network as a Socio-Technical System:

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2009-04-23 09:48:29
12Communications protocol / Data transmission / Protocols / Transmission Control Protocol / Parallel Virtual Machine / Myrinet / Message passing / Retransmission / Message Passing Interface / Computing / Parallel computing / Inter-process communication

Reprint from SCI Based Cluster Computing, H. Hellwagner and A. Reinefeld, eds., Springer, Berlin, 1999.

Add to Reading List

Source URL: www.cs.inf.ethz.ch

Language: English - Date: 2000-05-15 09:18:38
13Information / Proof of knowledge / Data / Mathematical proof / Non-interactive zero-knowledge proof / Malleability / Cryptographic protocols / Zero-knowledge proof / Mathematics

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as Report[removed]Malleable Proof Systems and Applications Melis

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:41
14HTTP / Cryptographic protocols / Secure communication / Computer networking / Network performance / Load balancing / Proxy server / Cache / Content delivery network / Computing / Internet / Network architecture

Electronic Commerce Research, 5: 99–[removed])  2005 Springer Science + Business Media, Inc. Manufactured in the Netherlands. Managing the Performance Impact of Web Security ADAM STUBBLEFIELD and AVIEL D. RUBIN John

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2009-06-18 12:23:19
15Decisional Diffie–Hellman assumption / Mathematics / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Computational Diffie–Hellman assumption / Computational hardness assumptions / Finite fields / Cryptographic protocols

Advances in Cryptology – Proceedings of Crypto ’07 (August 19–[removed], Santa Barbara, CA) A. Menezes Ed. Springer-Verlag, LNCS 4622, pages 482–499. A generalization of DDH with applications to protocol analysis a

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
16Computer network security / MQV / Diffie–Hellman key exchange / Authentication / AKA / Cryptography / Cryptographic protocols / Public-key cryptography

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 186–200. A New Key Exchang

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
17Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]Low Cost Attacks on Tamper Resistant Devices Ross

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
18Oracle Database / Concrete security / Universal composability / Perfect forward secrecy / Ciphertext indistinguishability / Random oracle / Cryptography / Cryptographic protocols / Oracle machine

International Workshop on Security – Proceedings of IWSEC ’07 (October 29–[removed], Nara, Japan) A. Miyaji, H. Kikuchi and K. Rannenberg, Eds. Springer-Verlag, LNCS 4752, pages 292–307. On Security Models and Comp

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
19Diffie–Hellman key exchange / Station-to-Station protocol / Diffie–Hellman problem / Key-agreement protocol / XTR / Advantage / Random self-reducibility / Public-key cryptography / Oracle machine / Cryptography / Cryptographic protocols / MQV

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 156–172. About the Securit

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
20Research methods / Current Protocols / John Crerar Library / Humana Press / Methods in Molecular Biology / Springer Science+Business Media / Nature Protocols / CSH Protocols / Publishing / Academic publishing / Academia

Microsoft Word - BSD Faculty Update 2010 FINAL.docx

Add to Reading List

Source URL: www.lib.uchicago.edu

Language: English - Date: 2010-04-28 19:01:44
UPDATE