Key-agreement protocol

Results: 124



#Item
51Conditions of Use 1) Disclaimer, Attribution and Copyright acknowledgement a) Any publication of Bureau tide predictions must acknowledge copyright in the Material in the Commonwealth of Australia represented by the Bure

Conditions of Use 1) Disclaimer, Attribution and Copyright acknowledgement a) Any publication of Bureau tide predictions must acknowledge copyright in the Material in the Commonwealth of Australia represented by the Bure

Add to Reading List

Source URL: www.bom.gov.au

Language: English - Date: 2014-12-03 18:01:45
52Key Establishment: Proofs and Refutations Kim-Kwang Raymond CHOO Bachelor of Science in Mathematics - Dec 2000 Bachelor of Applied Science (Hons) Industrial and Applied Maths - May 2002 Master of Information Technology -

Key Establishment: Proofs and Refutations Kim-Kwang Raymond CHOO Bachelor of Science in Mathematics - Dec 2000 Bachelor of Applied Science (Hons) Industrial and Applied Maths - May 2002 Master of Information Technology -

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:11:18
53Cisco PIX Interoperability Guide Copyright © [removed], bww bitwise works GmbH.. All Rights Reserved. The use and copying of this product is subject to a license agreement. Any other use is strictly prohibited. No part

Cisco PIX Interoperability Guide Copyright © [removed], bww bitwise works GmbH.. All Rights Reserved. The use and copying of this product is subject to a license agreement. Any other use is strictly prohibited. No part

Add to Reading List

Source URL: www.bitwiseworks.com

Language: English - Date: 2014-02-25 08:50:47
54Bypassing Passkey Authentication in Bluetooth Low Energy (extended abstract) Tomáš Rosa [removed]

Bypassing Passkey Authentication in Bluetooth Low Energy (extended abstract) Tomáš Rosa [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-23 07:35:21
55Linux FreeS/WAN Interoperability Guide Copyright © [removed], bww bitwise works GmbH.. All Rights Reserved. The use and copying of this product is subject to a license agreement. Any other use is strictly prohibited. N

Linux FreeS/WAN Interoperability Guide Copyright © [removed], bww bitwise works GmbH.. All Rights Reserved. The use and copying of this product is subject to a license agreement. Any other use is strictly prohibited. N

Add to Reading List

Source URL: www.bitwiseworks.com

Language: English - Date: 2014-02-25 08:50:47
56© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:11:55
57Secure Key Establishment for Mobile Networks by Yiu Shing Terry Tin Bachelor of Information Technology

Secure Key Establishment for Mobile Networks by Yiu Shing Terry Tin Bachelor of Information Technology

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:10:13
58VME Cell  TM VME Cell combines three layers of security in order to provide a completely secured Connection:

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:57
59CS355: Topics in cryptography  Fall 2007 Assignment #2 Due: Wednesday, Dec. 5, 2007.

CS355: Topics in cryptography Fall 2007 Assignment #2 Due: Wednesday, Dec. 5, 2007.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-12-25 03:13:40
60GATEKEEPER ABN-DSC SUBSCRIBER AGREEMENT

GATEKEEPER ABN-DSC SUBSCRIBER AGREEMENT

Add to Reading List

Source URL: gatekeeper.esign.com.au

Language: English - Date: 2010-06-15 22:56:03