DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Secure channel

Secure channel

  • The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?)?

    The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?)?

  • Multi-Device for Signal

    Multi-Device for Signal

  • A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography

    A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography

  • Trivia: a Fast and Secure Authenticated Encryption Scheme

    Trivia: a Fast and Secure Authenticated Encryption Scheme

  • Cryptanalysis of Globalplatform Secure Channel Protocols

    Cryptanalysis of Globalplatform Secure Channel Protocols

  • The RSA Algorithm

    The RSA Algorithm

  • Post-Quantum TLS Without Handshake Signatures Full Version, September 29, 2020

    Post-Quantum TLS Without Handshake Signatures Full Version, September 29, 2020

  • ECE596C: Handout #15

    ECE596C: Handout #15

  • Secure Channels Secure Channels • Example Applications – PGP: Pretty Good Privacy CS 161/194-1 – TLS: Transport Layer Security Anthony D

    Secure Channels Secure Channels • Example Applications – PGP: Pretty Good Privacy CS 161/194-1 – TLS: Transport Layer Security Anthony D

  • Further Simplifications in Proactive RSA Signatures

    Further Simplifications in Proactive RSA Signatures

  • Private Authentication

    Private Authentication

  • Employing Security Channel Protocol in the NFC Environment

    Employing Security Channel Protocol in the NFC Environment

  • A Secure Channel for Attribute-Based Credentials

    A Secure Channel for Attribute-Based Credentials

  • Security Upgrade for Card Content Management V1.0.1

    Security Upgrade for Card Content Management V1.0.1

  • Building Secure Channels

    Building Secure Channels

  • Application of NTRU Cryptographic Algorithm for Securing SCADA Communication

    Application of NTRU Cryptographic Algorithm for Securing SCADA Communication

  • On the Security of the TLS Protocol: a Systematic Analysis⋆

    On the Security of the TLS Protocol: a Systematic Analysis⋆

  • Pairing-Based Onion Routing

    Pairing-Based Onion Routing

Top View
  • Econtracting
  • A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds 343
  • As in RSA Encryption
  • TLS) Protocol Configurations
  • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels?
  • Cipher SMS- a Protocol for End to End Secure Transmission of SMS Polasa Abhinethri1, Tula Vandana2 PG Scholar1, Assistant Professor2 Department of CNIS G
  • RFC 8994: an Autonomic Control Plane
  • Asymmetric Cryptography
  • Applied Cryptography and Computer Security CSE 664 Spring 2020
  • Key Exchange and the Public Key Revolution
  • Steganography in Image Files: a Survey
  • Demonstration
  • (12) Patent Application Publication (10) Pub. No.: US 2006/0149962 A1 Fountain Et Al
  • PDA: Semantically Secure Time-Series Data Analytics with Dynamic Subgroups
  • On the Security of the TLS Protocol: a Systematic Analysis
  • OPC UA Security – How It Works
  • Post-Quantum TLS Without Handshake Signatures Full Version, May 7, 2020
  • Globalplatform Device Technology Secure Element Access Control Version 1.0


© 2024 Docslib.org    Feedback