Communication protocol

Results: 2818



#Item
191Knowledge representation / Technical communication / Semantic Web / Records management / Web portal / Fedora Commons / Ontology / Drupal / Facebook / Protocol for Metadata Harvesting / Digital library / Social navigation

Proceedings Template - WORD

Add to Reading List

Source URL: www.cs.utep.edu

Language: English - Date: 2011-02-04 19:52:04
192Information science / Computing / Information / Archival science / Records management / Digital libraries / Open access / Communication / BASE / Fedora Commons / Protocol for Metadata Harvesting / Metadata Encoding and Transmission Standard

Digital Library Curriculum Development Module 5-b: Application Software (Last updated: Module name Application software

Add to Reading List

Source URL: curric.dlib.vt.edu

Language: English - Date: 2009-08-25 17:40:59
193Internet protocols / Cryptographic protocols / Secure communication / Transport Layer Security / Hypertext Transfer Protocol / World Wide Web / HTTPS / Subdomain

#wcchi #AdvancedWPChi WordCamp Chicago 2016 SEO Audit Techniques Ryan Erwin

Add to Reading List

Source URL: internetmarketing.chicago.com

Language: English - Date: 2016-05-01 12:31:45
194Computing / Wireless / Technology / Bluetooth / Universal 2nd Factor / FIDO Alliance / Near field communication / Authentication / Authenticator

Bluetooth & NFC Transport for FIDO U2F July 22, 2015 Executive Summary Universal 2nd Factor (U2F) is a Fast IDentity Online (FIDO) Alliance protocol that lets online applications and services augment the security of the

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2015-08-04 16:08:10
195Security / Computer security / Cyberwarfare / Formal methods / Logic in computer science / E-commerce / Secure communication / Cryptographic software / Formal verification / Cryptographic protocol / Vulnerability / ProVerif

More Secure Software Systems by Formal Verification, Property-Based Testing, Secure Compilation, and Dynamic Monitoring Cătălin Hrițcu Inria Paris, Prosecco team

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2015-12-15 12:26:17
196Computing / Email / Cyberspace / Internet privacy / Secure communication / Opportunistic TLS / Transport Layer Security / Simple Mail Transfer Protocol / Extended SMTP / Email encryption / Opportunistic encryption / Gmail

Uncovering Cryptographic Failures 
 with Internet-Wide Measurement Zakir Durumeric University of Michigan

Add to Reading List

Source URL: zakird.com

Language: English
197

SSL Server Rating Guide version 2009k (14 OctoberCopyright © Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication. We feel

Add to Reading List

Source URL: dev.ssllabs.com

Language: English - Date: 2016-04-12 09:51:38
    198Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Transport Layer Security / Hypertext Transfer Protocol / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2014-02-27 10:40:02
    199Computing / Inter-process communication / Software / Computer architecture / Web development / JavaScript / Hypertext Transfer Protocol / Application programming interface / Technical communication / WebSocket / Futures and promises / XMLHttpRequest

    Streams APIyouenn/calvaris What is it? • Enabling I/O processing

    Add to Reading List

    Source URL: www.webengineshackfest.org

    Language: English - Date: 2016-03-14 05:03:51
    200Transport Layer Security / Computing / Internet / Cryptography / Internet security / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / HTTPS / GnuTLS / Heartbleed / Cross-site request forgery

    The BEAST Wins Again: Why TLS Keeps Failing to Protect HTTP Antoine Delignat-Lavaud, Inria Paris Joint work with K. Bhargavan, C. Fournet, A. Pironti, P.-Y. Strub INTRODUCTION

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2016-01-06 08:53:57
    UPDATE