Cryptographic engineering

Results: 331



#Item
291Videotelephony / Universal Mobile Telecommunications System / Cryptographic protocols / Multimedia / IP Multimedia Subsystem / Session Initiation Protocol / 3GPP / AKA / Digest access authentication / Technology / Electronic engineering / Mobile technology

TS[removed]V11[removed]Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-07-10 10:32:50
292Espionage / Side channel attack / Power analysis / Computer security / CMOS / Cryptography / Logic gate / Logic / Cryptographic engineering / Formal sciences / Electronic engineering / Security

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-18 12:31:34
293Interdisciplinarity / Academic discipline / Cognition / Ethology / Cryptographic software / Knowledge / Pedagogy / Secure Shell

however, is not appropriate, as it suggests at best an asymmetric relationship with what is already defined by others, whether that is the STEM (science, technology, engineering and mathematics) disciplines or policy mak

Add to Reading List

Source URL: bibliothek.wzb.eu

Language: English - Date: 2013-12-13 05:13:29
294Electronic engineering / Wireless / Network access / Computer network security / Cryptographic protocols / IEEE 802.11 / Wireless access point / Wireless security / Wireless LAN / Wireless networking / Technology / Wi-Fi

  NO[removed]IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT BENJAMIN JOFFE, et al.,

Add to Reading List

Source URL: epic.org

Language: English - Date: 2012-04-02 11:35:58
295Internet protocols / Computing / Internet standards / TSIG / Cryptographic protocols / DNSCurve / Domain Name System Security Extensions / Dynamic DNS / Name server / Domain name system / Internet / Network architecture

Master System & Network Engineering Securing the last mile of DNS with CGA-TSIG Research Project 2 Supervisors:

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2014-01-08 04:14:49
296Information retrieval / Artificial intelligence / Hash function / Hash table / Collision detection / Bounding volume / Cryptographic hash function / Collision / Universal hashing / Hashing / Search algorithms / Information science

Optimization of Large-Scale, Real-Time Simulations by Spatial Hashing Erin J. Hastings, Jaruwan Mesit, Ratan K. Guha College of Engineering and Computer Science, University of Central Florida 4000 Central Florida Blvd. O

Add to Reading List

Source URL: www.cs.ucf.edu

Language: English - Date: 2010-03-15 17:32:42
297Cloud standards / Internet standards / OAuth / Cryptographic protocols / Access token / Transport Layer Security / Network access server / Hypertext Transfer Protocol / Cross-site request forgery / Computing / Internet protocols / Internet

Internet Engineering Task Force (IETF) Request for Comments: 5849 Category: Informational ISSN: [removed]E. Hammer-Lahav, Ed.

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-04-20 19:53:50
298Password / Software / Computing / Ssh-keygen / Web-based SSH / Cryptographic software / Secure Shell / System software

Using SSH to Access Class Web Sites Down load the SSH client: http://engineering.wustl.edu/eit/ssh.aspx Select the “Install a SSH Client on your computer”. Install it using the default options After installing double

Add to Reading List

Source URL: classes.engineering.wustl.edu

Language: English - Date: 2012-09-10 13:18:01
299Man-in-the-middle attack / Key exchange / Authentication protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Security Issues in a CDPD Wireless Network by Yair Frankel, et. al. Summarized by Johnathan M. Reason CS294-7 Lecture Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: bnrg.eecs.berkeley.edu

Language: English - Date: 1996-04-16 10:49:00
300Cryptographic protocols / Electronic commerce / Public key certificate / X.509 / Internet privacy / Cryptographic hash function / .mobi / Certificate authority / Skype security / Cryptography / Public-key cryptography / Key management

Location-based Trust for Mobile User-generated Content: Applications, Challenges and Implementations Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang and Margaret Martonosi Dept. of Electrical Engineering Princeton Univ

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2008-04-24 05:07:51
UPDATE