Cryptographic engineering

Results: 331



#Item
61Cryptographic protocols / Computer network security / Internet protocols / Internet standards / Secure communication / Transport Layer Security / IPsec / OSI model / Internet protocol suite / Computing / Cryptography / Internet

Lecture 20: PGP, IPSec, SSL/TLS, and Tor Protocols Lecture Notes on “Computer and Network Security” by Avi Kak () April 23, 2015 1:35pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-23 13:36:30
62Network architecture / Internet protocols / Cryptographic protocols / Internet governance / Tunneling protocols / Internet Draft / IP Flow Information Export / MPLS-TP / Internet Engineering Task Force / Internet standards / Internet / Computing

  Internet Engineering Task Force (IETF) Website Revamp Requirements versionRay Pelletier:23 PM

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2014-05-06 10:57:51
63Electronic engineering / Wireless / Network access / Computer network security / Cryptographic protocols / IEEE 802.11 / Wireless access point / Wireless security / Wireless LAN / Wireless networking / Technology / Wi-Fi

  NOIN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT BENJAMIN JOFFE, et al.,

Add to Reading List

Source URL: epic.org

Language: English - Date: 2012-04-02 11:35:58
64Electronics / Broadband / Voice over IP / Session border controller / Cryptographic software / Communication software / Comparison of VoIP software / Videotelephony / Computer-mediated communication / Electronic engineering

ABC SBC: Securing and Flexible Trunking FRAFOS GmbH 1. Introduction   Enterprises are increasingly replacing their PBXs with VoIP PBX or are extending their PXB

Add to Reading List

Source URL: www.frafos.com

Language: English - Date: 2015-05-19 07:36:39
65Cyberwarfare / Cryptographic protocols / Computer security / Kerberos / Key distribution center / Needham–Schroeder protocol / Key / Cryptographic nonce / Woo–Lam / Cryptography / Computer network security / Key management

Lecture 10: Key Distribution for Symmetric Key Cryptography and Generating Random Numbers Lecture Notes on “Computer and Network Security” by Avi Kak () February 17, :26am

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-17 00:27:22
66Disk encryption / Inode / Unix / Cryptographic software / HTTP cookie / Cross-site scripting / JavaScript / BitLocker Drive Encryption / Ln / Computing / Computer security / Software

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-07-10 13:02:28
67Data / Access control / Internet protocols / Identity management / Mobile content / Universal Plug and Play / Internet Key Exchange / IPsec / Smart card / Computing / Security / Cryptographic protocols

Inter-device Authentication and Authorization Framework: Demonstration System based on Novel Smart Card Software Manabu Hirano Department of Information and Computer Engineering Toyota National College of Technology 2-1

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2008-07-21 13:42:26
68Data types / Cryptographic protocols / Inter-process communication / Models of computation / Smalltalk / Lambda calculus / Variable / Alice and Bob / Secure multi-party computation / Computing / Software engineering / Computer programming

Capability-based Financial Instruments 1 Mark S. Miller , Chip Morningstar2, Bill Frantz2 1

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2008-03-14 04:27:53
69Cryptographic protocols / Networking hardware / Electronic engineering / Wi-Fi / Computer network security / Point-to-point protocol over Ethernet / Wireless LAN / IEEE 802.11 / Router / Computing / Wireless networking / Technology

Belkin Surf N300 Wireless N Modem Router ADSL 2.4GHz 300Mbps • • •

Add to Reading List

Source URL: www.corintech.com.hk

Language: English - Date: 2013-10-03 04:31:12
70Hashing / Message authentication codes / Search algorithms / Hash function / SHA-2 / Crypt / SHA-1 / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Cryptography

Lecture 15: Hashing for Message Authentication Lecture Notes on “Computer and Network Security” by Avi Kak () April 30, 2015 3:29pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-30 15:30:26
UPDATE