Communication protocol

Results: 2818



#Item
231Computing / Software / Hypertext Transfer Protocol / Internet privacy / Cryptographic protocols / Secure communication / Cross-site request forgery / Computer access control / HTTP cookie / Same-origin policy / Basic access authentication / JavaScript

Lightweight Server Support for Browser-Based CSRF Protection Alexei Czeskis University of Washington Alexander Moshchuk

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
232Computing / Technical communication / Markup languages / World Wide Web / Web API / Application programming interface / Hypertext Transfer Protocol

RCUK Gateway to Research Project Document GATEWAY TO RESEARCH (GTRAPI AND CERIF ONLY) APIS

Add to Reading List

Source URL: gtr.rcuk.ac.uk

Language: English - Date: 2015-11-27 08:10:22
233Internet security / Internet Standards / Internet protocols / Routing / Secure communication / IP hijacking / Border Gateway Protocol / Tor / Traffic analysis / Onion routing / HTTPS / Computer network

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2014-10-08 09:38:20
234Open access / Academic publishing / Publishing / Knowledge / Academia / Communication / Research / Institutional repository / Open-access mandate / OpenDOAR / Protocol for Metadata Harvesting / PubMed Central

COAR State of Repositories May 2015-final

Add to Reading List

Source URL: www.coar-repositories.org

Language: English - Date: 2015-06-22 09:24:49
235Cryptography / Computing / Software / Cryptographic software / Internet protocols / OpenSSL / Cryptographic protocols / Internet Standards / Secure communication / Transport Layer Security / Apache HTTP Server / Application-Layer Protocol Negotiation

The State of TLS in httpd 2.4 William A. Rowe Jr. Getting Started ●

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-10-02 08:34:41
236Secure communication / Internet Standards / Internet protocols / Computer network security / Internet security / SoftEther VPN / Tor / Internet protocol suite / Transport Layer Security / Port scanner / HTTPS / File Transfer Protocol

Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

Add to Reading List

Source URL: nymity.ch

Language: English - Date: 2015-09-09 09:56:25
237Public-key cryptography / E-commerce / Key management / Public key infrastructure / Secure communication / Cryptographic primitive / ID-based encryption / Cryptography / Cryptographic protocol / Zero-knowledge proof / Public key certificate / Digital signature

ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

Add to Reading List

Source URL: esorics2015.sba-research.org

Language: English - Date: 2015-09-22 04:03:47
238Internet privacy / Secure communication / Computer networking / Cryptographic protocols / Transport Layer Security / Proxy server / Transmission Control Protocol / HTTPS / Internet protocol suite / Session Initiation Protocol

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2016-01-05 05:04:04
239Cryptographic protocols / Secure communication / Internet protocols / Transport Layer Security / Network protocols / Transmission Control Protocol / HTTPS / Ciphertext indistinguishability / Initialization vector / Hypertext Transfer Protocol / Block cipher mode of operation / Keystream

This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2015-11-02 11:01:00
240Internet protocols / Secure communication / Internet Standards / Transmission Control Protocol / Relay / Tor / Transport layer / Internet Relay Chat flood / HTTPS / Denial-of-service attack / Quality of service / Internet Relay Chat

IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2014-09-10 17:17:22
UPDATE