Cryptographic engineering

Results: 331



#Item
51Internet protocols / Computing / Internet standards / TSIG / Cryptographic protocols / DNSCurve / Domain Name System Security Extensions / Dynamic DNS / Name server / Domain name system / Internet / Network architecture

Master System & Network Engineering Securing the last mile of DNS with CGA-TSIG Research Project 2 Supervisors:

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2014-01-08 04:14:49
52Cryptographic protocols / Electronic commerce / X.509 / Diffie–Hellman key exchange / Public key infrastructure / Man-in-the-middle attack / Key authentication / Public key certificate / Key / Cryptography / Key management / Public-key cryptography

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-26 14:50:25
53Electronic engineering / Wireless / Network access / Computer network security / Cryptographic protocols / IEEE 802.11 / Wireless access point / Wireless security / Wireless LAN / Wireless networking / Technology / Wi-Fi

  NOIN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT BENJAMIN JOFFE, et al.,

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2012-04-02 11:35:58
54Transmission Control Protocol / Data transmission / Network performance / Computing / Communications protocol / Initialization vector / Throughput / Network packet / Cryptographic hash function / Information / Cryptography / Data

Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2010-02-05 14:49:04
55Phishing / Social engineering / Spamming / Cryptographic protocols / Cross-site scripting / Password / Two-factor authentication / Transport Layer Security / Transaction authentication number / Cybercrime / Computing / Security

Phishing with Super Bait Jeremiah Grossman WhiteHat Security Founder and Chief Technology Officer

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:35
56Wireless / Telecommunications engineering / Payment systems / Cryptographic protocols / Wireless security / Payment Card Industry Data Security Standard / Wireless access point / Wireless LAN / Wi-Fi / Wireless networking / Technology / Computer network security

VISA DATA SECURITY BULLETIN 9 September 2010 Wireless Networks Requires Data Security Controls Merchants that have implemented or are considering using wireless technology must develop and deploy

Add to Reading List

Source URL: en.chasepaymentech.ca

Language: English - Date: 2015-05-28 10:12:02
57Finite-state machine / Digital electronics / Cryptographic hash function / Forensic science / Hash function / Digital signature / Cryptography / Electronic engineering / Automata theory

Journal of Digital Forensics, Security and Law, VolColumn: The Physics of Digital Information-Part 21 Fred Cohen

Add to Reading List

Source URL: all.net

Language: English - Date: 2012-09-01 08:58:29
58Public-key cryptography / Cryptographic protocols / Elliptic curve cryptography / Key size / Elliptic curve Diffie–Hellman / Digital signature / Elliptic Curve DSA / Diffie–Hellman key exchange / Elliptic curve / Cryptography / Key management / Finite fields

Lecture 14: Elliptic Curve Cryptography and Digital Rights Management Lecture Notes on “Computer and Network Security” by Avi Kak () April 23, :55am

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-23 00:56:33
59Internet standards / Internet protocols / Email / HTTP / Cryptographic protocols / Hypertext Transfer Protocol / Transport Layer Security / URI scheme / Representational state transfer / Computing / Internet / Network architecture

Internet Engineering Task Force (IETF) Request for Comments: 7230 Obsoletes: 2145, 2616 Updates: 2817, 2818 Category: Standards Track ISSN:

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-06-06 21:14:27
60Electronic engineering / Wireless networking / Cryptography / Digital signature / Public-key cryptography / Modulation / Cognitive radio / Software-defined radio / Radio resource management / Telecommunications engineering / Technology

Authenticating Primary Users’ Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures Yao Liu, Peng Ning Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:14
UPDATE