Cryptographic engineering

Results: 331



#Item
181Videotelephony / Universal Mobile Telecommunications System / Cryptographic protocols / IP Multimedia Subsystem / Multimedia / Session Initiation Protocol / 3GPP / AKA / Digest access authentication / Technology / Electronic engineering / Mobile technology

TS[removed]V12[removed]Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and S

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-02-05 10:14:26
182Public safety / Cryptography / Computer network security / Computer security / Information security / Security engineering / Smart card / Cryptographic primitive / Institute for Applied Information Processing and Communications / Security / Crime prevention / National security

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 08:12:18
183Data types / Cryptographic protocols / Inter-process communication / Models of computation / Smalltalk / Lambda calculus / Variable / Alice and Bob / Secure multi-party computation / Computing / Software engineering / Computer programming

Capability-based Financial Instruments 1 Mark S. Miller , Chip Morningstar2, Bill Frantz2 1

Add to Reading List

Source URL: erights.org

Language: English - Date: 2004-05-18 05:27:32
184Search algorithms / Computer performance / Software optimization / Cryptographic hash functions / Error detection and correction / Hash function / Trie / SHA-1 / Algorithm / Computing / Statistics / Computer programming

HyperLogLog in Practice: Algorithmic Engineering of a State of The Art Cardinality Estimation Algorithm Stefan Heule Marc Nunkesser

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2013-02-06 17:19:53
185Electronics / Videotelephony / Network architecture / Internet protocols / Session Initiation Protocol / ZRTP / Next-generation network / Real-time Transport Protocol / IP Multimedia Subsystem / Computing / Cryptographic protocols / Electronic engineering

Final draft TR/NGCN – Security of session-based communications

Add to Reading List

Source URL: www.ecma-international.org

Language: English - Date: 2014-10-28 04:11:43
186Telecommunications engineering / Secure multi-party computation / Computing / Radio-frequency identification / Cryptography / ZigBee / Technology / Cryptographic protocols / Wireless

ZISC annual Report[removed]

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 02:11:49
187Technology / Wireless networking / Computer network security / Electronic engineering / Internet Protocol / Extensible Authentication Protocol / EAP-SIM / Wi-Fi Alliance / IEEE 802.11u / Wi-Fi / Cryptographic protocols / Computing

White Paper Architecture for Mobile Data Offload over Wi-Fi Access Networks Introduction Mobile network traffic is growing exponentially, and service providers must manage their networks efficiently to

Add to Reading List

Source URL: www.cisco.com

Language: English
188Electronic engineering / Wi-Fi / Computer networking / Computer network security / Cryptographic protocols / Wireless LAN / Wireless access point / Wireless repeater / Wireless router / Wireless networking / Computing / Technology

DAP-1360_C1_Datasheet_01(EU).indd

Add to Reading List

Source URL: ftp.dlink.eu

Language: English - Date: 2014-12-09 06:03:06
189Data types / Hashing / Search algorithms / Error detection and correction / Hash function / Pointer / Cryptographic hash function / C / Array data type / Computing / Software engineering / Computer programming

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 14, A Simple Mechanism for Type Security Across Compilation Units MICHAEL L. SCOTT

Add to Reading List

Source URL: www.cs.rochester.edu

Language: English - Date: 2004-06-23 16:50:23
190Computing / Tunneling protocols / Internet protocols / IPsec / Network protocols / Internet Security Association and Key Management Protocol / Mobile IP / Security association / Network layer / Cryptographic protocols / Data / Network architecture

Mobile Multi-Layered IPsec Heesook Choi, Hui Song, Guohong Cao, and Tom La Porta Department of Computer Science & Engineering The Pennsylvania State University University Park, PA[removed]Email: {hchoi,hsong,gcao,tlp}@cse.

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2005-01-06 12:57:28
UPDATE