Public-key cryptography

Results: 11378



#Item
661Cryptography / Key management / Public-key cryptography / Signature / E-commerce / Procurement / Digital signature / Melbourne City Centre / E-procurement / Paperless office

Yarra Ranges Council Speeds-Up Procurement’s Contract Signing with Secured Signing Challenge: Solution: “Timeframes for signature of Evaluation

Add to Reading List

Source URL: ds.securedsigning.com

Language: English - Date: 2016-04-07 01:01:35
662Cryptography / Computer security / Computer access control / Public key infrastructure / Public-key cryptography / Key management / Password / Salt / Key / Kerberos / Challengeresponse authentication / Passphrase

Pico without public keys Frank Stajano1 , Bruce Christianson2 , Mark Lomas3 Graeme Jenkinson1 , Jeunese Payne1 , Max Spencer1 , Quentin Stafford-Fraser1 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 14:25:32
663Cryptography / Computing / Cryptographic protocols / Internet protocols / Secure communication / Computer networking / Named data networking / Public-key cryptography / Encryption / Key / Symmetric-key algorithm / IPsec

A New Approach to Securing Audio Conference Tools Zhenkai Zhu Paolo Gasti Yanbin Lu

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English - Date: 2011-11-01 01:23:50
664Cryptography / Cryptographic software / Key management / Internet security / Transport Layer Security / OpenSSL / Heartbleed / Key / GNU Privacy Guard / Public-key cryptography / SHA-1 / Password

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: www.blu.org

Language: English - Date: 2014-09-17 23:54:20
665Secure communication / Public-key cryptography / Elliptic curve cryptography / Cryptographic protocols / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / HTTPS / Elliptic curve DiffieHellman / Handshaking / RSA

A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov

Add to Reading List

Source URL: securewww.esat.kuleuven.be

Language: English
666Computing / Fault-tolerant computer systems / Engineering / Byzantine fault tolerance / Failure / Fault tolerance / Public-key cryptography / Theory of computation / Evaluation / Fault injection / Dependability / Latency

BFT-B ENCH : F RAMEWORK TO E VALUATE R OBUSTNESS AND EFFECTIVENESS OF BFT P ROTOCOLS IN P RACTICE Divya Gupta, Lucas Perronne University of Grenoble, LIG, France Sara Bouchenak

Add to Reading List

Source URL: acmsocc.github.io

Language: English - Date: 2016-02-21 03:10:50
667Cryptography / Key management / Public key infrastructure / Identity management / Computer access control / Social networking services / Internet privacy / Authentication / Privacy / Web of trust / Airbnb / Public key certificate

Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data A White Paper from Rebooting the Web of Trust

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
668Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
669Signature / Electronic documents / Public-key cryptography / Notary / Records management technology / Email / Digital signature / Signature block / Course credit

REGISTRATION REQUEST FOR GRADUATE CREDIT Non-degree students DIRECTIONS—Use this form if you are a non-degree student who is not actively enrolled in a University degree program; needs coursework to appear on a graduat

Add to Reading List

Source URL: policy.umn.edu

Language: English - Date: 2015-12-30 11:17:55
670Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / Cryptographic protocols / Public key certificate / Certificate authority / Certificate policy / X.509 / Revocation list / Online Certificate Status Protocol

Amazon Trust Services Certificate Policy Version

Add to Reading List

Source URL: www.amazontrust.com

Language: English - Date: 2015-12-17 09:54:23
UPDATE