Public-key cryptography

Results: 11378



#Item
691Public key infrastructure / Public-key cryptography / Secure communication / Email encryption / Authentication / Transport Layer Security / Dynamic SSL

My Locker, Your Locker, Our Locker – How to Manage Keys and Certificates Pankaj Kumar Session Objectives

Add to Reading List

Source URL: pankaj-k.net

Language: English - Date: 2007-02-02 01:42:32
692Cryptography / Public-key cryptography / Cryptographic protocol / Transmission Control Protocol / Digital signature / Communications protocol

UNIVERSITY OF CALIFORNIA, IRVINE Sharing Sensitive Information with Privacy DISSERTATION

Add to Reading List

Source URL: emilianodc.com

Language: English - Date: 2014-11-28 06:44:18
693Cryptography / Public-key cryptography / Balls into bins / Bin / Digital signature / Powerball

Bounds and Improvements for BiBa Signature Schemes Michael Mitzenmacher and Adrian Perrig

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2002-02-08 16:53:24
694Cryptography / Computing / Internet / Internet protocols / Public-key cryptography / Key management / Domain name system / Internet Standards / Domain Name System Security Extensions / OpenDNSSEC / Digital signature / Time to live

Flexible and Robust Key Rollover in DNSSEC Yuri Schaeffer, Benno Overeinder, and Matthijs Mekking NLnet Labs, Amsterdam, The Netherlands Email: {yuri,benno,matthijs}@NLnetLabs.nl Abstract—DNSSEC security extensions ma

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2012-03-28 10:36:44
695Public-key cryptography / Public key infrastructure / Key management / Secure communication / Transport Layer Security / Certificate authority / HTTPS / Public key certificate / Self-signed certificate / Cipher suite / X.509 / TLS-SRP

ISY994 Series – Network Security Configuration Guide Requires firmware version 3.3.1+ Requires Java 1.8+ 1

Add to Reading List

Source URL: www.universal-devices.com

Language: English
696Public-key cryptography / Cryptography / Computational complexity theory / Zero-knowledge proof / Proof of knowledge / IP / Digital signature / Commitment scheme / NP / Random oracle / Mathematical proof / Markov chain

Private Client-Side Profiling with Random Forests and Hidden Markov Models George Danezis1 , Markulf Kohlweiss1 , Benjamin Livshits1 , and Alfredo Rial2 1 2

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:57
697Computing / Internet / Domain name system / Network architecture / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / Name server / Root name server

Validating Caching Resolver Wouter Wijngaards (NLnet Labs) http://www.nlnetlabs.nl/ © May 2008 Stichting NLnet Labs

Add to Reading List

Source URL: www.unbound.net

Language: English - Date: 2008-05-19 08:09:35
698Certificate authorities / Computer access control / Key management / Public-key cryptography / Transport Layer Security / Public key infrastructure / Authentication / Digital identity / Society for Worldwide Interbank Financial Telecommunication / IdenTrust / Identity theft / Entrust

i2i Karen Wendel Karen Wendel has more than 20 years of experience in financial services, applications development

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:43
699Turing Award laureates / Public-key cryptography / Cryptography / Applied mathematics / Whitfield Diffie / Ralph Merkle / Martin Hellman / DiffieHellman key exchange / Turing Award / Cryptographic protocol / Ron Rivest / Key management

Contact: Jim OrmondCRYPTOGRAPHY PIONEERS RECEIVE ACM A.M. TURING AWARD

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2016-03-08 10:06:12
700Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR

Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole

Add to Reading List

Source URL: www-verimag.imag.fr

Language: English - Date: 2007-10-18 09:44:59
UPDATE