Cryptographic protocols

Results: 3642



#Item
31Cryptography / Computing / Cryptography standards / Computer security / Key management / Cryptographic protocols / Ethernet / Cisco Catalyst / FIPS 140-2 / FIPS 140 / IPsec / IEEE 802.1X

Cisco Catalyst 3750-X Switch FIPSNon Proprietary Security Policy Level 1 Validation Version 0.4

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-08-04 07:52:28
32Computing / Cryptography / Network architecture / Transport Layer Security / Hypertext Transfer Protocol / Internet privacy / Internet protocols / Cryptographic protocols / Proxy server / HTTPS / Apache HTTP Server / Certificate authority

The TCPProxy Table of contents 1 Starting the TCPProxy..................................................................................................2 2 Preparing the Browser...........................................

Add to Reading List

Source URL: grinder.sourceforge.net

Language: English - Date: 2014-05-20 07:02:06
33Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2015-12-16 04:48:58
34Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange

Item Title Consolidated iTC Feedback – DNcPPv2 SD Reviewer iTC Editorial Team Item Identifier NDcPPv2 Supporting Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 09:29:08
35Software / Computing / Cross-platform software / CURL / Web scraping / Cryptographic protocols / Secure communication / Perl / Application programming interface / HTTPS / Web API

Developing and Testing Web APIs From a curl one-liner to a MooseX::App German Perl Workshop 2015, Dresden/Germany Daniel Böhmer Freelance Software Developer, Perl since 2010

Add to Reading List

Source URL: www.daniel-boehmer.de

Language: English - Date: 2015-05-07 04:01:29
36Computing / Network architecture / Cryptographic protocols / Computer network security / Cryptography / Tunneling protocols / Virtual private networks / Internet protocols / IPsec / Internet Key Exchange / Layer 2 Tunneling Protocol / NAT traversal

Secure Business Connectivity HOBLink VPN 2.1 Gateway The VPN Solution for More Security and Greater Flexibility Edition 10|13

Add to Reading List

Source URL: www.hobsoft.com

Language: English - Date: 2014-01-10 07:06:54
37Cryptography / Computing / Mass surveillance / Cryptographic protocols / Internet protocols / Applied mathematics / RSA Security / Dual EC DRBG / Bullrun / National Security Agency / IPsec / RSA BSAFE

Microsoft PowerPoint - preneel_iacr_dl_vienna2016_print.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2016-05-11 07:33:19
38Cryptography / Software engineering / E-commerce / RSA / Secure multi-party computation / ALGOL 68 / Const / Method / Public-key cryptography / Apache Avro

L1 - Faster Development and Benchmarking of Cryptographic Protocols Axel Schr¨opfer, Florian Kerschbaum, Debmalya Biswas, Steffen Geißinger, and Christoph Sch¨ utz SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2009-09-30 17:02:37
39Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
40Cryptography / Computing / Computational complexity theory / Proof of knowledge / IP / Distribution / Challengeresponse authentication / Communications protocol / ZK / Zero-knowledge proof

Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2) Definition of zero-knowledge (ZK)

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-03-06 05:37:28
UPDATE