- Home
- » Tags
- » Secure channel
Top View
- Econtracting
- A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds 343
- As in RSA Encryption
- TLS) Protocol Configurations
- Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels?
- Cipher SMS- a Protocol for End to End Secure Transmission of SMS Polasa Abhinethri1, Tula Vandana2 PG Scholar1, Assistant Professor2 Department of CNIS G
- RFC 8994: an Autonomic Control Plane
- Asymmetric Cryptography
- Applied Cryptography and Computer Security CSE 664 Spring 2020
- Key Exchange and the Public Key Revolution
- Steganography in Image Files: a Survey
- Demonstration
- (12) Patent Application Publication (10) Pub. No.: US 2006/0149962 A1 Fountain Et Al
- PDA: Semantically Secure Time-Series Data Analytics with Dynamic Subgroups
- On the Security of the TLS Protocol: a Systematic Analysis
- OPC UA Security – How It Works
- Post-Quantum TLS Without Handshake Signatures Full Version, May 7, 2020
- Globalplatform Device Technology Secure Element Access Control Version 1.0
- Pairing-Based Onion Routing*
- Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
- Implementing a Secure Channel
- FIPS 140-2 Non-Proprietary Security Policy Vaultic405™, Vaultic421
- Cryptography for Secure Channels Kenny Paterson
- Homework III, Foundations of Cryptography 2018
- The Twist-Augmented Technique for Key Exchange
- Introduction Secure Channel
- FIPS140-2 Security Policy for the Jcop21id 32K Javacard Platform
- An Efficient Implementation for Key Management Technique Using Smart Card and ECIES Cryptography
- Confidential Card Content Management V1.2
- CNIT 141 Cryptography for Computer Networks
- Secure Channel Protocol '03' V1.1.1
- Policy Commander 2.0.2 Console Guide
- Secure Channel Protocol 03 Card Specification V 2.2 – Amendment D Version 1.0
- Computationally Sound Compositional Logic for Key Exchange Protocols ∗
- Secure Channel
- Revisiting SSL/TLS Implementations: New Bleichenbacher Side
- Secure Channel Protocol '03' Card Specification V2.3 – Amendment D Version 1.1.2
- A Pull-Based Wireguard Control Plane
- Constructing Confidential Channels from Authenticated Channels
- Network-Hiding Communication and Applications to Multi-Party Protocols
- Scalable Secure Bidirectional Group Communication
- Designated Attribute Proofs with the Camenisch–Lysyanskaya Signature
- Opacity Secure Channel V1.0
- Quantum Safe Cryptography and Security an Introduction, Benefits, Enablers and Challenges
- Secure Channel Establishment Algorithm to Increase Security of Iot Er
- Secure Channels Based on Authenticated Encryption Schemes: a Simple Characterization
- A Study of Various Steganographic Techniques Used for Information Hiding
- Topic 6: Public Key Encryption and Digital Signatures
- Ts 102 484 V11.2.0 (2019-04)
- Aspects of Hardware Methodologies for the NTRU Public-Key Cryptosystem
- A Key Management Scheme Based on Outsourced Database
- DD2448 Foundations of Cryptography (Krypto20) Exercises to Prepare for the Homework Douglas Wikström, [email protected] March 10, 2020
- Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing Mohamed Grissa, Student Member, IEEE, Attila A
- An Alternative Diffie-Hellman Protocol
- Pairing-Based Onion Routing
- Secure Channel Free Public Key Encryption with Multiple Keywords
- Public-Key Authenticated Encryption with Keyword Search: a Generic Construction and Its Quantum-Resistant Instantiation
- A Mechanised Cryptographic Proof of the Wireguard Virtual Private Network Protocol
- Extremely Low-Overhead Security for Wireless Sensor Networks: Algorithms and Implementation