Cryptographic protocol

Results: 1374



#Item
841Computing / ZRTP / Cipher suite / IPsec / Secure Shell / HTTP Secure / Cryptography / Opportunistic encryption / Secure Real-time Transport Protocol / Cryptographic protocols / Data / Information

          Is  Opportunistic  Encryption  the  Answer?  

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
842Opportunistic encryption / Internet Key Exchange / Perfect forward secrecy / Key-agreement protocol / Security association / ZRTP / X.509 / Public-key cryptography / Domain Name System Security Extensions / Cryptography / Cryptographic protocols / IPsec

Opportunistic Keying as a Countermeasure to Pervasive Monitoring Stephen Kent BBN Technologies Abstract This document was prepared as part of the IETF response to concerns about “pervasive monitoring” (PM) [Farrell-p

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
843Electronic commerce / Cryptographic protocols / Internet standards / Wireless Transport Layer Security / Wireless Application Protocol / Public key certificate / Certificate authority / Transport Layer Security / Trusted third party / Cryptography / Public-key cryptography / Key management

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Add to Reading List

Source URL: www.entrust.net

Language: English - Date: 2014-11-26 16:25:48
844Network architecture / Network protocols / Cryptographic protocols / Internet standards / Constrained Application Protocol / Datagram Transport Layer Security / OAuth / JSON / Internet / Computing / Internet protocols / Cloud standards

  Object  Security  in  Web  of  Things     John  Mattsson,  Göran  Selander,  Göran  AP  Eriksson,  Ericsson  Research      

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-05-11 08:39:01
845IPsec / Secure Shell / Internet Security Association and Key Management Protocol / Key-agreement protocol / Public-key cryptography / Diffie–Hellman key exchange / Transport Layer Security / Whitfield Diffie / FIPS 140 / Cryptographic protocols / Cryptography / Internet Key Exchange

Microsoft Word - ASA-SM Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-17 10:33:44
846Cryptographic protocols / Information / Secure Shell / AS2 / Cryptographic software / Electronic data interchange / Pretty Good Privacy / Linoma Software / Computing / Internet standards / Data

USPS Data Transfer Services Secure Protocol Options Communications Method EDI/INT AS2 (preferred solution) The "Internet Engineering Task Force Working Group for

Add to Reading List

Source URL: ribbs.usps.gov

Language: English - Date: 2014-05-07 14:47:44
847Information / Internet protocols / Secure communication / Electronic commerce / Block cipher modes of operation / Transport Layer Security / Padding / Initialization vector / IPsec / Cryptography / Cryptographic protocols / Data

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-12 12:47:41
848Cryptographic protocols / Message authentication codes / Hashing / Internet protocols / HMAC / SHA-2 / Cryptographic hash function / Authentication / Label Distribution Protocol / Cryptography / Computing / Network architecture

Internet Engineering Task Force (IETF) Request for Comments: 7349 Category: Standards Track ISSN: [removed]L. Zheng

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-08-14 14:33:49
849Internet protocols / Secure communication / Internet / Cipher suite / RC4 / Transmission Control Protocol / Internet Engineering Task Force / Transport Layer Security / Cryptography / Cryptographic protocols / Computing

TLS 1.3 Wish List Eric Rescorla [removed] IETF 87 August 1, 2013

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2013-08-02 02:31:46
850Cyberwarfare / Kerberos / Computing / Cryptographic protocols / Key distribution center / Ticket Granting Ticket / Ticket / Needham–Schroeder protocol / Computer network security / Key management / Computer security

Kerberos for Internet-of-Things IETF89 Thomas Hardjono MIT Kerberos & Internet Trust Consortium February, 2014

Add to Reading List

Source URL: www.tschofenig.priv.at

Language: English - Date: 2014-03-04 10:40:45
UPDATE