Cryptographic engineering

Results: 331



#Item
321Information / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Yahalom / Wide Mouth Frog protocol / Replay attack / Public-key cryptography / Kerberos / Cryptographic nonce / Cryptographic protocols / Cryptography / Data

Pranav Vyas, Dr. Bhushan Trivedi / International Journal of Engineering Research and Applications (IJERA) ISSN: [removed]www.ijera.com

Add to Reading List

Source URL: www.ijera.com

Language: English - Date: 2012-11-17 00:05:41
322Computer network security / Internet protocols / Telecommunications engineering / Cryptographic protocols / Network protocols / Network address translation / IPsec / Firewall / Internet protocol suite / Computing / Network architecture / Data

Developing a Next-Generation Internet Architecture Robert Braden, David Clark, Scott Shenker, and John Wroclawski July 15, 2000

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2001-11-21 13:02:24
323Wireless access points / Electronic engineering / Technology / IEEE 802.11 / Cryptographic protocols / Hotspot / Evil twin / Virtual private network / Rogue access point / Wi-Fi / Computer network security / Computing

Evil Twins FAQ What is an “Evil Twin”? An Evil Twin, sometimes referred to as Wiphishing, is a potential security threat to users

Add to Reading List

Source URL: www.wi-fi.org

Language: English - Date: 2011-11-01 13:40:08
324Wireless / Telecommunications engineering / Automatic identification and data capture / Privacy / Radio-frequency identification / Challenge-response authentication / Distance-bounding protocol / Man-in-the-middle attack / Communications protocol / Information / Data / Cryptographic protocols

Preparation of Papers for the First EURASIP Workshop on RFID Technology

Add to Reading List

Source URL: www.eurasip.org

Language: English - Date: 2009-04-03 09:44:44
325Electronic engineering / Videotelephony / Electronics / Technology / AKA / GSM / Subscriber identity module / Security service / Security token / Universal Mobile Telecommunications System / Cryptographic protocols / Code division multiple access

Security for the Third Generation (3G) Mobile System Security for the Third Generation (3G) Mobile

Add to Reading List

Source URL: www.isrc.rhul.ac.uk

Language: English - Date: 2002-09-30 11:55:18
326Computer network security / Technology / Cryptographic protocols / Computing / Telecommunications engineering / IEEE 802.11 / Wi-Fi / Wireless networking / AOSS

AirStation One-Touch Secure System (AOSS™) A Description of WLAN Security Challenges and Potential Solutions

Add to Reading List

Source URL: www.buffalotech.com

Language: English - Date: 2012-07-11 11:48:00
327Social engineering / Cryptographic protocols / HTTP Secure / Secure communication / Man-in-the-browser / Password / Email / Phishing / Man-in-the-middle attack / Computing / Internet / HTTP

PDF Document

Add to Reading List

Source URL: www2.futureware.at

Language: English - Date: 2007-01-24 10:47:29
328Universal Mobile Telecommunications System / Network switching subsystem / Cryptographic protocols / UMTS security / GSM / IMSI-catcher / AKA / Subscriber identity module / SMS / Technology / Electronic engineering / Mobile technology

PDF Document

Add to Reading List

Source URL: www.cs.stevens.edu

Language: English - Date: 2006-01-17 23:39:50
329IEEE 802.11 / Electronic engineering / Wi-Fi / Wireless access point / Network security / Wireless network / Telecommunications engineering / Cryptographic protocols / Wireless security / Wireless networking / Computer network security / Technology

PDF Document

Add to Reading List

Source URL: projects.cerias.purdue.edu

Language: English - Date: 2006-01-06 05:57:47
330Cryptographic hash functions / Integrated circuits / Electronic design automation / Logic design / Field-programmable gate array / Electronic design / NIST hash function competition / Application-specific integrated circuit / FPGA prototype / Electronic engineering / Digital electronics / Electronics

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 13:43:20
UPDATE