Skip to main content

Home/ Coders/ Group items tagged cryptography

Rss Feed Group items tagged

1More

Effective Cryptography in the JVM - Terse Systems - 3 views

  •  
    Regarder Le film complet film en Streaming Vf www.TousFilms.com
1More

The Legion of the Bouncy Castle C# Cryptography APIs - 0 views

  •  
    Apis for OpenPGP, CMS, TLS, X.509, and PKCS#12 ...
1More

FUTURISTIC CRYPTO - BLOCKCHAIN FIRM SUTERUSU TO IMPLEMENT ZK-PROOF-ENABLED PRIVACY - 0 views

  •  
    The Director of research at blockchain firm Blockstream and mathematician Andrew Poelstra announced that zero-knowledge proof (ZK-Proof) systems are "one of the most exciting areas of development" in the cryptography providing the basis of privacy-preserving solutions. According to the Mathematician, cryptographers have made significant progress in the application efficiency,
1More

Atom Authentication, by Mark Pilgrim on 2003-12-17 | XML.com - 1 views

  •  
    « A little-known fact about RFC 2617 is that HTTP authentication is extensible. The RFC defines and Apache has modules for Basic and Digest authentication, but developers are free to define different algorithms for use within the HTTP authentication framework, and servers are free to insist that clients support those algorithms if they want access to the server's resources. »
1More

David J. Smith's Program : Authenticode and Strong naming ("signing") - 0 views

  •  
    This is great information on codesigning, with links to more information, FINALLY, someone who gets how this is supposed to work.
1More

Code Signing: two worlds defined - 0 views

  •  
    A quick write up on how to do code signing so that you get BOTH strong naming for GAC installation, AND Code-Signing for author "trust" validation ... Notice that you have to do Code-Signing in a separate post-build step.
1More

Microsoft U-Prove CTP - Microsoft Connect - 0 views

  •  
    U-Prove is an innovative cryptographic technology that enables the issuance and presentation of cryptographically protected claims in a manner that provides multi-party security: issuing organizations, users, and relying parties can protect themselves not just against outsider attacks but also against attacks originating from each other. At the same time, the U-Prove technology enables any desired degree of privacy (including authenticated anonymity and pseudonymity) without contravening multi-party security. These user-centric aspects make the U-Prove technology ideally suited to create the digital equivalent of paper-based credentials and the plastic cards in one's wallet.
1More

Tutorial: OpenSSL Command | SYS-CON.com, by David dodd on 2011-08-18 - 2 views

  •  
    Covers: Encoding, encryption, checksums, passwords & pass phrases.
1 - 9 of 9
Showing 20 items per page