Cryptographic protocol

Results: 1374



#Item
71Intellectual property law / Trademark law / Madrid system / Trademark / Patent Cooperation Treaty / Patent application / Communications protocol / Cryptographic protocol / European Patent Organisation / Hague Agreement Concerning the International Deposit of Industrial Designs / European Patent Convention

G:srosoftdaultNormalmal

Add to Reading List

Source URL: www.ghclaw.com

Language: English - Date: 2009-04-20 15:21:12
72Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation

Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-24 16:43:48
73Cryptography / Secure multi-party computation / Secret sharing / Cryptographic protocol / Communications protocol

Systematizing Secure Computation for Research and Decision Support Jason Perry, Debayan Gupta, Joan Feigenbaum and Rebecca N. Wright Rutgers University, Yale University

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2014-09-07 12:36:30
74Secure multi-party computation / Software Guard Extensions / Cryptography / Singapore Exchange / Secure two-party computation / Eval / Communications protocol / Cryptographic protocol

Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1

Add to Reading List

Source URL: work.debayangupta.com

Language: English - Date: 2016-01-22 16:19:24
75Cryptographic protocols / Internet protocols / World Wide Web / Secure communication / E-commerce / HTTPS / Hyperlink / Public key certificate / Password / IPsec / Common Criteria / Hypertext Transfer Protocol

Supporting Document Mandatory Technical Document Evaluation Activities for Network Device cPP July-2016

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 07:40:10
76Routing protocols / Public-key cryptography / Hashing / Cryptography / Key management / Border Gateway Protocol / Cryptographic hash function / Hash chain / Merkle tree / RSA / Man-in-the-middle attack / Autonomous system

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
77Transport Layer Security / Network architecture / Internet protocols / Cryptographic protocols / Network protocols / Gossip protocol / Hypertext Transfer Protocol / Internet Relay Chat / HTTPS / Certificate authority / Clientserver model / Simple Mail Transfer Protocol

Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs Laurent Chuat Pawel Szalachowski

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-11-04 13:06:02
78Secure communication / Cryptographic protocols / Transport Layer Security / HTTPS / Hypertext Transfer Protocol

TLS Environmental Requirements 2007 Trucks with 2006 or older engine/exhaust Age Exception Application

Add to Reading List

Source URL: www.portvancouver.com

Language: English - Date: 2016-07-11 12:55:49
79Public-key cryptography / Cryptography / Homeomorphisms / Homomorphic encryption / Secure multi-party computation / Paillier cryptosystem / Communications protocol / Cryptographic protocol / Secret sharing / Data Encryption Standard

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2014-05-12 11:51:10
80Public-key cryptography / Cryptography / Financial cryptography / Digital signature / Blind signature / David Chaum / Commitment scheme / Proof of knowledge / Blinding / Zero-knowledge proof / FiatShamir heuristic / Cryptographic protocol

Anonymous Credentials Light Foteini Baldimtsi, Anna Lysyanskaya foteini, Computer Science Department, Brown University Abstract. We define and propose an efficient and provably secure construction of bl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-21 23:04:44
UPDATE