Skip to main content

Home/ Coders/ Group items tagged HTTP Cryptography

Rss Feed Group items tagged

marekw Wawrzynczyk

Effective Cryptography in the JVM - Terse Systems - 3 views

  •  
    Regarder Le film complet film en Streaming Vf www.TousFilms.com
Joel Bennett

The Legion of the Bouncy Castle C# Cryptography APIs - 0 views

  •  
    Apis for OpenPGP, CMS, TLS, X.509, and PKCS#12 ...
block_chain_

FUTURISTIC CRYPTO - BLOCKCHAIN FIRM SUTERUSU TO IMPLEMENT ZK-PROOF-ENABLED PRIVACY - 0 views

  •  
    The Director of research at blockchain firm Blockstream and mathematician Andrew Poelstra announced that zero-knowledge proof (ZK-Proof) systems are "one of the most exciting areas of development" in the cryptography providing the basis of privacy-preserving solutions. According to the Mathematician, cryptographers have made significant progress in the application efficiency,
Fabien Cadet

Atom Authentication, by Mark Pilgrim on 2003-12-17 | XML.com - 1 views

  •  
    « A little-known fact about RFC 2617 is that HTTP authentication is extensible. The RFC defines and Apache has modules for Basic and Digest authentication, but developers are free to define different algorithms for use within the HTTP authentication framework, and servers are free to insist that clients support those algorithms if they want access to the server's resources. »
Joel Bennett

David J. Smith's Program : Authenticode and Strong naming ("signing") - 0 views

  •  
    This is great information on codesigning, with links to more information, FINALLY, someone who gets how this is supposed to work.
Joel Bennett

Code Signing: two worlds defined - 0 views

  •  
    A quick write up on how to do code signing so that you get BOTH strong naming for GAC installation, AND Code-Signing for author "trust" validation ... Notice that you have to do Code-Signing in a separate post-build step.
Joel Bennett

Microsoft U-Prove CTP - Microsoft Connect - 0 views

  •  
    U-Prove is an innovative cryptographic technology that enables the issuance and presentation of cryptographically protected claims in a manner that provides multi-party security: issuing organizations, users, and relying parties can protect themselves not just against outsider attacks but also against attacks originating from each other. At the same time, the U-Prove technology enables any desired degree of privacy (including authenticated anonymity and pseudonymity) without contravening multi-party security. These user-centric aspects make the U-Prove technology ideally suited to create the digital equivalent of paper-based credentials and the plastic cards in one's wallet.
Fabien Cadet

Tutorial: OpenSSL Command | SYS-CON.com, by David dodd on 2011-08-18 - 2 views

  •  
    Covers: Encoding, encryption, checksums, passwords & pass phrases.
1 - 9 of 9
Showing 20 items per page