Cryptographic protocol

Results: 1374



#Item
41Computing / Network architecture / Internet / Network protocols / Internet Standards / Internet protocols / Cryptographic protocols / Secure communication / Transport Layer Security / Transmission Control Protocol / Clientserver model / Session

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:10
42Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
43Computing / Network architecture / Internet / Multihoming / Cryptographic protocols / Internet protocols / Identifier/Locator Network Protocol / IPsec / Internet protocol suite / Transmission Control Protocol

Fast,&Secure&Failover&for&IP& Saleem&Bha:& &&&Ditchaphong&PhoomikiaDssak& Ran&Atkinson&

Add to Reading List

Source URL: saleem.host.cs.st-andrews.ac.uk

Language: English - Date: 2014-10-06 15:05:30
44Computing / Network architecture / Internet / Cryptographic protocols / Secure communication / Transport Layer Security / Internet protocols / Internet Standards / HTTPS / Opportunistic TLS / Email client / Simple Mail Transfer Protocol

Proceedings on Privacy Enhancing Technologies 2016; ):1–18 Shuai Li* and Nicholas Hopper Mailet: Instant Social Networking under Censorship

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2016-06-28 22:06:37
45Computing / Network architecture / Internet / Internet protocols / Network protocols / Network management / Cryptographic protocols / Secure communication / Transmission Control Protocol / Simple Mail Transfer Protocol / Load balancing / Hypertext Transfer Protocol

ALOHA LOAD BALANCER CHECKING THE HEALTH OF APPLICATION SERVERS “APPNOTE” #0013 ― LIST OF CHECKS IN ALOHA This application note is intended to list the main checks available in the Aloha solution to be sure of the s

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:44:16
46Cryptography / Secure multi-party computation / Digital signature / Secure two-party computation / Secret sharing / Cryptographic protocol / Challengeresponse authentication / Blinding

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
47Computing / Network architecture / Internet / Network performance / Cryptographic protocols / Secure communication / Internet protocols / Flow control / Transmission Control Protocol / Transport Layer Security / TCP congestion control / HTTPS

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
48Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / X.509 / Certificate authority / Online Certificate Status Protocol / Public key certificate / Lightweight Directory Access Protocol / Revocation list

DOEGrids CA Release Notes Revision: Introduction The New DOEGrids Certificate Authority is ready for deployment by the operations staff. This document discusses the new service and the changes

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2003-04-08 19:00:32
49Computing / Network architecture / Cryptographic protocols / Internet protocols / Tunneling protocols / Wireless networking / IPsec / Internet security / Extensible Authentication Protocol / Internet Key Exchange / 6LoWPAN / Virtual private network

Name : Azamuddin Rotation Project Title : Survey on IoT Security Outline : • • •

Add to Reading List

Source URL: www.cs.wustl.edu

Language: English - Date: 2016-01-09 09:36:29
50Internet Standards / Internet protocols / Cryptographic protocols / Character encoding / Public key infrastructure / String / Lightweight Directory Access Protocol / Null / Online Certificate Status Protocol / Data type / Hash function / Value

KEK GRID CA Certificate and CRL Profile VerMay 30, 2016

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2016-05-25 03:17:59
UPDATE