Cryptographic engineering

Results: 331



#Item
121Technology / Computer network security / Wireless / Electronic engineering / Wireless access point / Wi-Fi / Wireless LAN / Temporal Key Integrity Protocol / DBm / Cryptographic protocols / Wireless networking / IEEE 802.11

Microsoft Word - EPI-3601S.doc

Add to Reading List

Source URL: www.keenansystems.com

Language: English - Date: 2013-02-14 11:18:32
122Cryptographic protocols / Internet protocols / Computer network security / Internet Protocol / Multihoming / Host Identity Protocol / Internet Key Exchange / Packet Processing / Transmission Control Protocol / Network architecture / Computing / Data

Internet Engineering Task Force (IETF) R. Moskowitz, Ed. Request for Comments: 7401 HTT Consulting Obsoletes: 5201 T. Heer

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-04-09 16:39:00
123Computer network security / Computing / Electronic engineering / Wi-Fi Protected Access / Data / AirPort / Wireless access point / Hotspot / Wireless security / Cryptographic protocols / Wi-Fi / IEEE 802.11

Proxim Wireless At-a-Glance ORiNOCO Indoor Wireless Solutions Clients

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:22:48
124Cryptographic software / Human rights / PGP / Webmail / Tor / Privacy / HTTP cookie / Google Chrome / Hushmail / Software / Internet privacy / Computing

International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 2- FebPrivacy Shielding against Mass Surveillance Kashyap.V#1, Boominathan.P#2 #1

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-01-05 09:37:37
125Computing / Internet standards / Cryptographic protocols / Public-key cryptography / Network Time Protocol / Transport Layer Security / IPsec / Secure Shell / Network address translation / Internet protocols / Network architecture / Internet

Internet Engineering Task Force (IETF) Request for Comments: 5906 Category: Informational ISSN: [removed]B. Haberman, Ed.

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-06-21 18:53:28
126Secure multi-party computation / Public key infrastructure / Algorithm / Information privacy / Transmission Control Protocol / Preparer Tax Identification Number / Internet privacy / Cryptography / Cryptographic protocols / Public-key cryptography

A Trusted Execution Platform for Multiparty Computation by Sameer Ajmani Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2002-06-04 13:33:05
127Computer-mediated communication / Electronics / Session border controller / ZRTP / Voice over IP / Session Initiation Protocol / Comparison of VoIP software / Videotelephony / Electronic engineering / Cryptographic protocols

Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany

Add to Reading List

Source URL: www.hznet.de

Language: English - Date: 2007-05-29 07:25:08
128Electronic commerce / Elliptic curve cryptography / RSA / OpenSSL / Cryptanalysis / Key size / Cryptographic engineering / Microsoft CryptoAPI / Cryptography / Cryptographic software / Public-key cryptography

Crypto for developers[removed]Jean-Philippe Aumasson (@veorq) The training This training is about cryptography for non-cryptographers: how to make sure you

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2013-08-17 18:32:50
129Software engineering / Java / Computing / Cryptographic protocols / Computer programming

A Trusted Third-Party Computation Service Sameer Ajmani Robert Morris Barbara Liskov

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2002-06-04 13:27:28
130IEEE 802.11 / Wireless networking / Wi-Fi Protected Access / Wireless / DBm / Telecommunications engineering / Orthogonal frequency-division multiplexing / Broadband / Cryptographic protocols / Computer network security / Technology

I N T U I C O M BroadBand Solutions 5GHz[removed]GHz BROADBAND SPECIFICATIONS K E Y F E AT U R E S

Add to Reading List

Source URL: www.intuicom.com

Language: English - Date: 2012-02-22 23:19:45
UPDATE