Cryptographic protocol

Results: 1374



#Item
831Computing / Network architecture / Secure communication / Internet standards / Network Time Protocol / IPsec / Secure Shell / HTTP Secure / Cipher suite / Cryptographic protocols / Internet protocols / Data

Security Requirements for Network Devices Errata #3 3 November 2014 1

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-11-07 08:28:43
832Internet / Internet protocols / Internet standards / Secure communication / Public-key cryptography / Transport Layer Security / Extensible Messaging and Presence Protocol / Internet security / Vulnerability / Computing / Cryptography / Cryptographic protocols

Improving Security on the Internet (with improved Collaboration) Hannes Tschofenig [removed] Abstract Securing the Internet has been an on-going activity since the early days of the IETF and a variety of

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-03-10 16:49:33
833Notary / Digital signature / Electronic signature / Security token / Cryptographic protocol / Non-repudiation / Public key infrastructure / Public key certificate / Blind signature / Cryptography / Public-key cryptography / Key management

Trust Relations in a Digital Signature System Based on a Smart Card Jean-Luc Giraud & Ludovic Rousseau Gemplus, Cryptography & Security Group, B.P. 100, 13881 Gémenos Cedex, France Phone: +[removed]22, +[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
834Information / Public-key cryptography / Communications protocol / Password-authenticated key agreement / Yahalom / Cryptography / Cryptographic protocols / Data

Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
835Internet standards / Internet protocols / Computing / Authentication protocol / TSIG / Public-key cryptography / Password / Cryptography / Cryptographic protocols / Internet

Automatically Detecting Authentication Limitations in Commercial Security Protocols Stephen H. Brackin  Arca Systems, Inc. 303 E. Yates St. Ithaca, NY 14850

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
836Internet standards / Network architecture / Cryptographic protocols / Network management / System administration / Datagram Transport Layer Security / Syslog / Simple Network Management Protocol / Transport Layer Security / Internet protocols / Computing / Internet

Position Paper for W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT) Hardening Operations and Management Against Passive Eavesdropping Bernard Aboba, Microsoft Corporation

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
837Computing / Client–server model / Peer-to-peer / Trusted Computing / Communications protocol / Secure two-party computation / Secure multi-party computation / Cryptographic protocols / Data / Information

Exploring Privacy in Location-based Services Using Cryptographic Protocols

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-10 15:06:54
838Internet / Secure communication / HTTP / Internet standards / Transport Layer Security / HTTP Secure / Secure Hypertext Transfer Protocol / Communications protocol / URI scheme / Computing / Cryptographic protocols / Data

A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring https://www.w3.org/2014/strint/ Strengthening the path and strengthening the end-points Xavier Marjou, Emile Stephan, Jean-Michel Combes, Iun

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
839Computer-mediated communication / Cryptographic protocols / Spam filtering / Internet standards / DomainKeys Identified Mail / S/MIME / Simple Mail Transfer Protocol / Transport Layer Security / MIME / Computing / Email / Internet

draft-crocker-strint-workshop-messaging-00 - STRINT Workshop Position Paper: Levels of Opportunistic Privacy Protection for Messaging-Oriented Architectures

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
840Open standards / Cryptographic software / Cross-platform software / Extensible Messaging and Presence Protocol / Online chat / Encryption / Privacy / Opportunistic encryption / Distributed social network / Computing / Internet privacy / Ethics

A few thesis regarding privacy and security Subject: A few thesis regarding privacy and security From: "Andreas Kuckartz" Date: 01/20/2014 10:46 PM To: group-strint-submission@w3.org

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
UPDATE