About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 121. Chapters: Diffie-Hellman key exchange, Secure Shell, HTTP Secure, Dining cryptographers protocol, IPsec, Chaffing and winnowing, Electronic money, Key-agreement protocol, Transport Layer Security, X.509, Zero-knowledge proof, DomainKeys Identified Mail, Digital credential, Wired Equivalent Privacy, Digest access authentication, Secret sharing, Internet Key Exchange, BitTorrent protocol encryption, Wi-Fi Protected Access, 3-D Secure, Oblivious transfer, Publius Publishing System, SSH File Transfer Protocol, Secure Remote Password protocol, Secure multi-party computation, Kerberized Internet Negotiation of Keys, Off-the-Record Messaging, Needham-Schroeder protocol, Temporal Key Integrity Protocol, Station-to-Station protocol, Hashcash, Online Certificate Status Protocol, ZRTP, Secure Communications Interoperability Protocol, WLAN Authentication and Privacy Infrastructure, Proof of knowledge, IEEE 802.11i-2004, ANSI ASC X9.95 Standard, Socialist millionaire, Alice and Bob, Secure Real-time Transport Protocol, Yao's Millionaires' Problem, Diffie-Hellman problem, Interlock protocol, Password-authenticated key agreement, Universal composability, Non-interactive zero-knowledge proof, Wi-Fi Protected Setup, HTTPsec, Certificate signing request, Private information retrieval, Password Authenticated Key Exchange by Juggling, StrongSwan, High Assurance Internet Protocol Encryptor, Homomorphic secret sharing, SPNEGO, Proactive secret sharing, Simple Authentication and Security Layer, Secure channel, AS2, Generic Bootstrapping Architecture, Group Domain of Interpretation, Certificate Management Protocol, Code Access Security, SPEKE, Secure copy, Web-based SSH, Certification path validation algorithm, CAVE-based authentication, Wireless Transport Layer Security, Cipher suite, Neuman-Stubblebine protocol, Cryptographic protocol, Vouch...