Cryptographic engineering

Results: 331



#Item
251Data synchronization / Cryptography / Theory of computation / Server / Barbara Jane Liskov / Secret sharing / Byzantine fault tolerance / Replication / Proactive secret sharing / Computing / Fault-tolerant computer systems / Cryptographic protocols

Authentication in a Reconfigurable Byzantine Fault Tolerant System by Kathryn Chen Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: pmg.lcs.mit.edu

Language: English - Date: 2005-01-26 20:47:49
252Electromagnetism / Injection locking / Crystal oscillator / Clock signal / Phase noise / Signal generator / Frequency modulation / Clock generator / Oscilloscope / Oscillators / Electronic engineering / Electronics

Journal of Cryptographic Engineering[removed]:71-77 DOI[removed]s13389[removed]Synchronization Method for SCA and Fault Attacks Sergei Skorobogatov

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-01-22 11:21:53
253Radio resource management / Multiplexing / Broadcast engineering / Computer network security / Fading / Wireless security / Channel / Rayleigh fading / Cryptographic protocol / Technology / Telecommunications engineering / OSI protocols

Signal-Flow-Based Analysis of Wireless Security Protocols C ¸ a˘gatay C ¸ apara , Dennis Goeckela , Kenneth G. Patersonb,∗, Elizabeth A. Quagliab , Don Towsleya , Murtaza Zaferc

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-09-26 09:12:44
254Electronic commerce / Public-key cryptography / Portable software / Social engineering / Phishing / Public key certificate / Transport Layer Security / Internet privacy / Error message / Software / Computing / Cryptographic protocols

Too Much, Too Late: What Just-in-Time Notifications Really Indicate David G. Gordon Janice Tsai

Add to Reading List

Source URL: davegordonltd.com

Language: English
255Technology / Cryptographic protocols / Electronic engineering / Computer network security / IEEE 802.11 / Wireless access point / Huawei E5 / Password / Nintendo Wi-Fi Connection / Wi-Fi / Wireless networking / Computing

[removed]OUCH-January-Final1-English

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2012-07-19 07:45:43
256Cyberwarfare / Telecommunications engineering / Military technology / Communications security / COMSEC / Transmission security / Joint Electronics Type Designation System / Electronic Key Management System / Military communications / Cryptography / Controlled Cryptographic Item

CONTROLLED CRYPTOGRAPHIC ITEM (CCI) BRIEFING 1. As a member of a U.S. military service, agency, department, contractor or an authorized service vendor you have been selected to perform communications electronic maintenan

Add to Reading List

Source URL: www.cdse.edu

Language: English - Date: 2013-05-07 14:45:43
257Pseudorandom number generators / Secure communication / Cryptographic primitive / Cryptographic engineering / Cryptographically secure pseudorandom number generator / Transport Layer Security / Cryptographic hash function / Side channel attack / Man-in-the-middle attack / Cryptography / Cryptographic software / Cryptographic protocols

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
258Cryptographic protocols / Internet protocols / Internet standards / Public-key cryptography / Computer security / Lightweight Directory Access Protocol / Internet Engineering Task Force / Information security / Public key certificate / Cryptography / Computing / Data

FIREWALL CONFIGURATION to authorize Notarius’ digital signature SUMMARY To activate, use and validate Notarius’ digital signature, four outbound communication flows to Notarius’ servers must be enabled. These flows

Add to Reading List

Source URL: notarius.com

Language: English - Date: 2014-07-17 11:47:14
259Computer network security / Wireless / Wireless access points / Wireless networking / Cryptographic protocols / IEEE 802.11u / Hotspot / BT Openzone / Roaming / Technology / Wi-Fi / Electronic engineering

Wi-Fi Certified Passpoint Architecture for Public Access Aruba White Paper Wi-Fi Certified Passpoint Architecture for Public Access

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2012-06-29 13:36:40
260Cryptographic protocols / Wireless / Telecommunications engineering / IEEE 802.11 / Wireless security / Wireless access point / Wi-Fi / Wired Equivalent Privacy / Wireless LAN / Wireless networking / Technology / Computer network security

GAO Logo (Black_white-w_stroke)cover

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2010-11-30 14:40:32
UPDATE