Cryptographic protocol

Results: 1374



#Item
41Microsoft Word - IBSS&K Engineering.doc

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:10
42Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
43Fast,&Secure&Failover&for&IP& Saleem&Bha:& &&&Ditchaphong&PhoomikiaDssak& Ran&Atkinson&

Fast,&Secure&Failover&for&IP& Saleem&Bha:& &&&Ditchaphong&PhoomikiaDssak& Ran&Atkinson&

Add to Reading List

Source URL: saleem.host.cs.st-andrews.ac.uk

Language: English - Date: 2014-10-06 15:05:30
44Proceedings on Privacy Enhancing Technologies 2016; ):1–18  Shuai Li* and Nicholas Hopper Mailet: Instant Social Networking under Censorship

Proceedings on Privacy Enhancing Technologies 2016; ):1–18 Shuai Li* and Nicholas Hopper Mailet: Instant Social Networking under Censorship

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2016-06-28 22:06:37
45ALOHA LOAD BALANCER CHECKING THE HEALTH OF APPLICATION SERVERS “APPNOTE” #0013 ― LIST OF CHECKS IN ALOHA This application note is intended to list the main checks available in the Aloha solution to be sure of the s

ALOHA LOAD BALANCER CHECKING THE HEALTH OF APPLICATION SERVERS “APPNOTE” #0013 ― LIST OF CHECKS IN ALOHA This application note is intended to list the main checks available in the Aloha solution to be sure of the s

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:44:16
46MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
47HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet  -

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
48DOEGrids CA Release Notes Revision: Introduction The New DOEGrids Certificate Authority is ready for deployment by the operations staff. This document discusses the new service and the changes

DOEGrids CA Release Notes Revision: Introduction The New DOEGrids Certificate Authority is ready for deployment by the operations staff. This document discusses the new service and the changes

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2003-04-08 19:00:32
49Name : Azamuddin Rotation Project Title : Survey on IoT Security Outline : • • •

Name : Azamuddin Rotation Project Title : Survey on IoT Security Outline : • • •

Add to Reading List

Source URL: www.cs.wustl.edu

Language: English - Date: 2016-01-09 09:36:29
50KEK GRID CA  Certificate and CRL Profile VerMay 30, 2016

KEK GRID CA Certificate and CRL Profile VerMay 30, 2016

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2016-05-25 03:17:59