Cryptographic protocol

Results: 1374



#Item
951Trusted computing / Trusted Platform Module / Cryptographic nonce / Revocation list / Certificate authority / Counter / Transmission Control Protocol / Public key certificate / Trusted Computing Group / Cryptography / Public-key cryptography / Key management

Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS Marten van Dijk, Luis F. G. Sarmenta, Jonathan Rhodes, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory (C

Add to Reading List

Source URL: csg.csail.mit.edu

Language: English - Date: 2007-05-24 15:48:08
952Electronic commerce / Diffie–Hellman key exchange / RSA / XTR / Digital signature / Cipher / Three-pass protocol / SPEKE / Cryptography / Public-key cryptography / Cryptographic protocols

The history of Non-Secret Encryption by J H ELLIS 1. Public-key cryptography (PKC) has been the subject of much discussion in the open literature since Diffie and Hellman suggested the possibility in their paper of April

Add to Reading List

Source URL: cryptocellar.web.cern.ch

Language: English - Date: 1999-02-19 10:12:53
953Computing / Internet protocols / Cryptographic protocols / Electronic commerce / Public-key cryptography / FTPS / File Transfer Protocol / Comparison of FTP client software / X.509 / Internet / Internet standards / Network architecture

FLORIDA DEPARTMENT OF FINANCIAL SERVICES DIVISION OF WORKERS’ COMPENSATION Secure Socket Layer (SSL) / File Transfer Protocol (FTP) Instructions for POC EDI 2.1 and Claims EDI R3

Add to Reading List

Source URL: www.myfloridacfo.com

Language: English - Date: 2013-04-24 14:03:38
954Dolev-Yao model / Secure multi-party computation / Cryptographic primitive / Formal verification / Communications protocol / Transport Layer Security / Authentication protocol / Secure channel / Random oracle / Cryptography / Cryptographic protocols / Universal composability

Report on DIMACS∗ Workshop on Security Analysis of Protocols Date of workshop: June 7 – 9, 2004 Workshop Organizers: John Mitchell, Stanford University Ran Canetti, IBM Watson

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-27 15:21:45
955Internet protocols / Cryptographic protocols / Internet standards / Domain Name System Security Extensions / X.509 / Certificate authority / Public key certificate / Online Certificate Status Protocol / Transport Layer Security / Cryptography / Public-key cryptography / Key management

REDUCING THE X.509 ATTACK SURFACE WITH DNSSEC’S DANE MARCH[removed]VerisignInc.com

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2012-03-28 13:55:02
956Information / Internet Key Exchange / Station-to-Station protocol / IPsec / Key-agreement protocol / Internet Security Association and Key Management Protocol / Internet security / Diffie–Hellman key exchange / Online Certificate Status Protocol / Cryptographic protocols / Cryptography / Data

Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols ∗ William Aiello AT&T Labs Research

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2003-02-16 21:33:47
957Computing / Ssh-keygen / Secure Shell / OpenSSH / Secure copy / X Window System / Comparison of SSH clients / Ssh-agent / Tunneling protocol / Software / Cryptographic software / System software

iSiLK A graphical front-end for the SiLK tools User’s Guide for iSiLK version[removed]January 2011

Add to Reading List

Source URL: tools.netsa.cert.org

Language: English - Date: 2011-03-23 09:07:22
958Computer security / Internet standards / Code division multiple access / Computer network security / Cryptographic protocols / AAA protocol / RADIUS / OAuth / Kerberos / Computing / Internet protocols / Internet

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2014-03-02 06:27:58
959Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / HTTP Secure / Proxy server / Secure communication / Computing / Cryptographic protocols

Performance Analysis of TLS Web Servers CRISTIAN COARFA, PETER DRUSCHEL and DAN S. WALLACH Department of Computer Science, Rice University TLS is the protocol of choice for securing today’s e-commerce and online transa

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2009-06-18 12:23:19
960Computer network security / Technology / Cryptographic protocols / Internet protocols / Extensible Authentication Protocol / IEEE 802.1X / IEEE 802.11 / Wireless LAN / RADIUS / Wireless networking / Cryptography / Computing

A Solution for Wireless Privacy and Payments based on E-cash A. Karygiannis∗ Aggelos Kiayias1† Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE