Cipher suite

Results: 202



#Item
141Cryptographic software / Internet protocols / Secure communication / Cryptographic protocols / Open Source Tripwire / Cipher suite / HMAC / PKCS / SHA-2 / Cryptography / Cryptography standards / Computing

Tripwire Cryptographic Module FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-07 08:37:23
142Computing / Classical cipher / Word square / Computer programming / Latin alphabets / Linguistics

q[removed]G S treet N W , Suite[removed]Washington, DC[removed]Tel: [removed] 0 Fax: [removed] 0

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2003-03-10 15:51:41
143Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / HTTP Secure / Proxy server / Secure communication / Computing / Cryptographic protocols

Performance Analysis of TLS Web Servers CRISTIAN COARFA, PETER DRUSCHEL and DAN S. WALLACH Department of Computer Science, Rice University TLS is the protocol of choice for securing today’s e-commerce and online transa

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2009-06-18 12:23:19
144Classical cipher / Four-square cipher / Computer programming / Linguistics / Computing

AN I~~ERNAI~ONALASSOUAT~ONFOR SUEWE AND TECHNOLOGY I’HARMACE~~CAL Suite 1500

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2003-10-08 16:56:12
145Mathematical analysis / Classical cipher / International Obfuscated C Code Contest

398 Brookline Avenue Suite Eight Boston, Massachusetts[removed]Telephone[removed]George F. Cahill, Jr., M.D.

Add to Reading List

Source URL: profiles.nlm.nih.gov

Language: English - Date: 2009-10-05 14:37:50
146HTTP / Data / Computing / Security / Internet protocols / HTTP Secure / Perfect forward secrecy / Cipher suite / Public-key cryptography / Cryptographic protocols / Secure communication / Cryptography

Configuring SSL Securely    With recent revelations about state sponsored intelligence gathering efforts I wanted to capitalize  on our attention to them and suggest a way we, as IT professio

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2014-06-09 20:08:57
147Galois/Counter Mode / AES instruction set / Q / Coprocessor / NSA Suite B Cryptography / Cryptography / Block cipher modes of operation / Advanced Encryption Standard

Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor Markku-Juhani O. Saarinen Norwegian University of Science and Technology Department of Telematics, O.S. Bragstads plass

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 14:42:29
148Linguistics / Classical cipher / Word square

Cleaning Up After Cookies Version 1.0 Katherine McKinley — kate[at]isecpartners[dot]com iSEC Partners, Inc 444 Spear Street, Suite 105

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2012-06-14 11:07:36
149Internet protocols / Secure communication / Data / Information / Internet standards / Cipher suite / FIPS 140-2 / Session Initiation Protocol / OpenSSL / Cryptographic protocols / Computing / Cryptographic software

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Cellcrypt Mobile for Secret Client Version 1.0

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2014-04-22 11:36:13
150Internet protocols / Secure communication / Information / Internet standards / Electronic commerce / Transport Layer Security / Key Management Interoperability Protocol / Cipher suite / OASIS / Cryptographic protocols / Computing / Data

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-04-29 11:14:25
UPDATE