Cryptographic protocol

Results: 1374



#Item
821Cryptographic software / Portable software / Internet standards / Data synchronization / WinSCP / File Transfer Protocol / Secure Shell / Password / File manager / Software / Computing / Internet

sFTP Transmission Instructions - April 2012

Add to Reading List

Source URL: www.revenue.wi.gov

Language: English - Date: 2012-04-25 09:45:58
822Key management / Secure communication / CMAC / MAC protocol data unit / CCMP / Security / Computing / Data / Cryptographic protocols / IEEE 802.11 / Wireless networking

November 2006 doc.: IEEE[removed]1581r0 IEEE P802.11 Wireless LANs Proposal selected Pseudo Code in LB88 Date: [removed]

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2009-12-17 09:44:35
823Wireless networking / Secure communication / MAC protocol data unit / CCMP / CMAC / IEEE Standards Association / Institute of Electrical and Electronics Engineers / Technology / Engineering / Standards organizations / Cryptographic protocols / IEEE 802.11

Microsoft Word[removed]000w-proposal-selected-pseudo-code-in-lb88.d…

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2009-12-17 09:43:39
824Communications protocol / Data transmission / Protocols / Xanthus / Transmission Control Protocol / Computing / Data / Information / Cryptographic protocols

SIWG CPUC Workshop Panels: Discussion Questions October 27, 2014 Xanthus

Add to Reading List

Source URL: www.cpuc.ca.gov

Language: English - Date: 2015-01-04 00:30:38
825Data / Interoperability / Cryptographic protocols / Internet Protocol / University of New Hampshire / University of New Hampshire InterOperability Laboratory / DHCPv6 / Internet Key Exchange / IPsec / Network architecture / IPv6 / Computer architecture

IPv6 Test Solutions for these Devices and More: • •

Add to Reading List

Source URL: www.iol.unh.edu

Language: English - Date: 2014-10-08 12:58:01
826Cryptographic protocols / Electronic commerce / Internet protocols / DigiCert / Certificate policy / X.509 / Revocation list / Online Certificate Status Protocol / Public key certificate / Cryptography / Public-key cryptography / Key management

Microsoft Word - CPS_V3-08_Final.doc

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2011-09-29 16:25:39
827Cyberwarfare / Trusted Computing / Cryptographic protocol / Operating system / Cryptographic hash function / Cryptography / Security / Computer security

Formal Modeling and Verification of CloudProxy Wei Yang Tan1 , Rohit Sinha1 , John L. Manferdelli2 , and Sanjit A. Seshia1 1 2

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2014-08-07 18:17:41
828Public-key cryptography / Secure communication / Cryptographic software / Extensible Messaging and Presence Protocol / HTTP Secure / Opportunistic encryption / X.509 / Transport Layer Security / Simple Mail Transfer Protocol / Cryptography / Computing / Cryptographic protocols

File: /tmp/hosts-2.txt IS IT TIME TO BRING BACK THE HOSTS FILE? INELEGANT ENCRYPTION SOLUTIONS FOR AN INELEGANT NETWORK? Peter Eckersley, Technology Projects Director Electronic Frontier Foundation

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
829Security / Internet privacy / Cryptographic protocols / Electronic commerce / Open standards / HTTP Secure / Computer security / Extensible Messaging and Presence Protocol / Email / Computing / Secure communication / Internet

Trust problems in pervasive monitoring Melinda Shore, Karen O’Donoghue We open by noting that this workshop is titled “A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring.” The word “pas

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
830Information / ZRTP / MIKEY / Interlock protocol / Cryptographic protocols / Cryptography / Data

Microsoft Word - paper-strint-johnston.docx

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
UPDATE