Cryptographic protocol

Results: 1374



#Item
981Key management / Secure communication / Public key infrastructure / Grid Security Infrastructure / Key-agreement protocol / X.509 / Transport Layer Security / Key exchange / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / Public-key cryptography

On the Application of Identity-Based Cryptography in Grid Security Hoon Wei Lim Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2006-05-02 10:04:49
982Network architecture / Internet Key Exchange / IPsec / Internet security / Virtual private network / Kerberized Internet Negotiation of Keys / Security association / Layer 2 Tunneling Protocol / NAT traversal / Cryptographic protocols / Computing / Data

IPSec: Performance Analysis and Enhancements Craig A. Shue, Minaxi Gupta Computer Science Department Indiana University Steven A. Myers

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2010-03-15 16:30:06
983Key management / DigiCert / Internet protocols / Online Certificate Status Protocol / X.509 / Public key certificate / Nginx / Certificate authority / Cryptography / Public-key cryptography / Cryptographic protocols

DigiCert SSL Certificate Newsletter June 2012

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2012-06-27 19:11:16
984Cryptographic protocols / Certificate policy / X.509 / Revocation list / Public key certificate / Certificate authority / Online Certificate Status Protocol / Public key infrastructure / Transport Layer Security / Cryptography / Public-key cryptography / Key management

InCommon Certification Practices Statement for Server Certificates

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2010-08-25 14:48:57
985Public-key cryptography / Information / Secure Shell / AKA / Learning with errors / X Window System / MQV / Communications protocol / Cryptography / Cryptographic protocols / Data

Authenticated Key Exchange from Ideal Lattices ¨ ur Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg¨ 1 Institute of Software, Chinese Academy of Sciences, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-30 10:34:44
986Information / Commitment scheme / Malleability / Communications protocol / Ciphertext indistinguishability / IP / Zero-knowledge proof / Proof of knowledge / Transmission Control Protocol / Cryptography / Cryptographic protocols / Data

An Algebraic Approach to Non-Malleability Vipul Goyal∗ Silas Richelson†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-27 04:52:39
987MQV / Key-agreement protocol / Diffie–Hellman key exchange / Perfect forward secrecy / Digital signature / Diffie–Hellman problem / Whitfield Diffie / Cryptography / Cryptographic protocols / Public-key cryptography

Cryptographic Schemes based on Elliptic Curve Pairings Sattam S. Al-Riyami Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-06-16 10:55:54
988Internet protocols / Internet standards / Cryptographic protocols / Tunneling protocols / Computer network security / IPsec / Security Parameter Index / Header checksum / Transmission Control Protocol / Computing / Network architecture / Internet

On the (In)Security of IPsec in MAC-then-Encrypt Configurations ∗ Jean Paul Degabriele

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-07-27 11:01:10
989Information / Man-in-the-middle attack / Interlock protocol / Out-of-band / Communications protocol / Transport Layer Security / Authentication / Streaming media / Computing / Cryptographic protocols / Data

ABSTRACT Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE:

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-12-05 17:18:58
990Universal composability / Computing / Secure multi-party computation / Secure two-party computation / Communications protocol / Universal Turing machine / Cryptography / Turing machine / Cryptographic protocols / Data / Information

A Simpler Variant of Universally Composable Security for Standard Multiparty Computation Ran Canetti∗ Asaf Cohen†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 10:39:30
UPDATE