Search results

Jump to navigation Jump to search
Results 1 – 21 of 2,179
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • [[Category:Cryptographic protocols]] ...
    138 bytes (11 words) - 15:27, 13 April 2012
  • [[Category:Cryptographic protocols]] ...
    531 bytes (65 words) - 23:14, 9 July 2024
  • .... Bellovin|author2=M. Merritt|title=Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks|book-title=Proceedings of the I.E.E.E. Sy [[Category:Cryptographic protocols]] ...
    3 KB (457 words) - 16:17, 17 July 2022
  • The '''Oakley Key Determination Protocol''' is a [[key-agreement protocol]] that allows authenticated parties to exchange keying material ac ...tp://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14139-isakmp.html ...
    1 KB (181 words) - 06:07, 22 May 2023
  • ...|first2=Hugo |date=August 1999 |title=Public-key cryptography and password protocols |url=https://dl.acm.org/doi/abs/10.1145/322510.322514 |journal=ACM Trans. I ...
    2 KB (216 words) - 19:42, 15 October 2024
  • [[Category:Cryptographic protocols]] [[Category:Internet protocols]] ...
    2 KB (203 words) - 01:37, 17 October 2023
  • ...|first2= M. |last2= Merritt |title= Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks |series= Proceedings of the IEEE Symposi * [[Key-agreement protocol]] ...
    3 KB (384 words) - 19:11, 3 June 2025
  • {{Short description|Algorithm used in cryptographic protocols}} ...
    2 KB (317 words) - 22:34, 3 October 2023
  • The X-KRSS defines the protocols needed to register public key information. X-KRSS can generate the key mat ...erned with the definition of security 'bindings' for specific Web Services protocols. ...
    3 KB (410 words) - 05:50, 2 October 2024
  • In cryptography, a '''key-agreement protocol''' is a protocol whereby two (or more) parties generate a cryptogr ...|first1=Ran |last2=Krawczyk |first2=Hugo |chapter=Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels |date=6 May 2001 |pages=453–474 ...
    12 KB (1,683 words) - 16:52, 18 June 2025
  • ...ntication and key exchange and is designed to be key exchange independent; protocols such as [[Internet Key Exchange]] (IKE) and [[Kerberized Internet Negotiati ...rom the details of key exchange. There may be many different key exchange protocols, each with different security properties. However, a common framework is r ...
    5 KB (686 words) - 23:14, 5 March 2025
  • ...methods that can be used include [[Password-authenticated key agreement]] protocols etc.<ref>{{cite book|title=Computer Networks|first1=Andrew S.|last1=Tanenba * [[Key-agreement protocol]] ...
    4 KB (650 words) - 20:34, 18 October 2024
  • [[Category:Network protocols]] ...
    886 bytes (118 words) - 20:59, 9 June 2025
  • [[Category:Cryptographic protocols]] ...
    3 KB (439 words) - 03:34, 17 April 2022
  • [[Category:Cryptographic protocols]] ...
    971 bytes (120 words) - 21:15, 28 August 2024
  • Cryptographic protocols are widely used for secure application-level data transport. A cryptographi ...thod]]s, which are also sometimes themselves referred to as "cryptographic protocols". For instance, TLS employs what is known as the [[Diffie–Hellman key excha ...
    9 KB (1,258 words) - 07:59, 25 April 2025
  • A common use is web server software running secure socket layer (SSL) protocols. Server-specific keys issued by trusted authorities are merged into the ke ...
    1 KB (202 words) - 00:30, 18 November 2024
  • {{Short description|Notation for communication protocols}} We can express more complicated protocols in such a fashion. See [[Kerberos (protocol)|Kerberos]] as an example. Some ...
    4 KB (551 words) - 15:47, 22 August 2023
  • 1 KB (142 words) - 06:23, 23 June 2025
  • ...chan.fr/Software/spore/wideMouthedFrog.html Wide Mouthed Frog], ''Security Protocols Open Repository''</ref> [[Category:Computer access control protocols]] ...
    3 KB (453 words) - 17:34, 2 March 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)