Cryptographic protocol

Results: 1374



#Item
21Cryptography / Computing / Computational complexity theory / Proof of knowledge / IP / Distribution / Challengeresponse authentication / Communications protocol / ZK / Zero-knowledge proof

Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2) Definition of zero-knowledge (ZK)

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-03-06 05:37:28
22Computing / Computer access control / Computer security / Cryptography / Cryptographic protocols / Hypertext Transfer Protocol / Secure communication / Internet protocols / Transport Layer Security / Digest access authentication / Basic access authentication / Form-based authentication

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D1.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:48
23Network architecture / Computing / Internet / Internet Standards / Cryptographic protocols / Computer network security / Internet Protocol / TACLANE / IPv6 / Multiprotocol Label Switching / High Assurance Internet Protocol Encryptor / Router

Experiment Proposal Template

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2011-05-13 21:34:51
24Cryptography / Cryptographic hash functions / Error detection and correction / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / SHA-2 / Hash function / SHA-1 / Block cipher / Galois/Counter Mode

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-05 11:52:34
25Computing / Computer access control / Internet protocols / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / OAuth / HTTP cookie / Web portal / HTTPS / World Wide Web / Cross-site scripting

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:49
26Computing / Cryptography / Network architecture / Internet protocols / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / World Wide Web / Transport Layer Security / Secure Remote Password protocol / Communications protocol / HTTPS

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

Add to Reading List

Source URL: places10.di.fc.ul.pt

Language: English - Date: 2010-12-07 19:00:11
27Cryptography / Public-key cryptography / Cryptographic protocols / Secure communication / Cryptographic software / Signal Protocol / DiffieHellman key exchange / Digital signature / XTR / HKDF / Signal / Elliptic curve DiffieHellman

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2016-05-24 15:16:00
28Computing / Cryptography / Wireless networking / Computer security / Cryptographic protocols / IEEE 802.11u / Computer network security / Extensible Authentication Protocol / IEEE 802.11 / Authentication

November 2007 doc.: IEEE2786r0 IEEE P802.11 Wireless LANs Liaison from IETF EMU to IEEEDate:

Add to Reading List

Source URL: mentor.ieee.org

Language: English - Date: 2011-06-28 18:39:10
29Communications protocol / Data transmission / Cryptographic protocol / Citizen science / Sustainability

Sustainable Shorelines Advisory Committee Meeting January 20, 10:00 am - 3:30 pm NYSDEC Hudson River National Estuarine Research Reserve Norrie Point Environmental Center Staatsburg, NYMEETING SUMMARY

Add to Reading List

Source URL: www.hrnerr.org

Language: English - Date: 2016-03-31 13:58:13
30Cryptography / Public key infrastructure / Public-key cryptography / Key management / Transport Layer Security / Cryptographic protocols / Certificate authority / Certificate policy / Online Certificate Status Protocol / Revocation list / Public key certificate / X.509

KEK GRID CA Service Certificate Policy and Certificate Practices Statements Ver

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2016-05-25 03:17:16
UPDATE