Cryptographic protocols

Results: 3642



#Item
161Cryptography / Computing / Software / Hypertext Transfer Protocol / Transport Layer Security / Secure communication / Cryptographic protocols / HTTP Strict Transport Security / HTTP Public Key Pinning / HTTP cookie / HTTPS / Browser security

Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning Michael Kranch Joseph Bonneau

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-07-30 05:47:43
162Secure communication / Cryptographic protocols / Internet Standards / Internet protocols / Internet security / Transport Layer Security / Internet Information Services / Cipher suite / Windows / Security Support Provider Interface / FTPS / Security and safety features new to Windows Vista

Thierry ZOLLER Principal Security Consultant http://www.g-sec.lu G-SEC™ is a vendor independent Luxemburgish led

Add to Reading List

Source URL: www.g-sec.lu

Language: English - Date: 2010-02-16 11:11:06
163Computing / World Wide Web / Digital media / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / Internet privacy / Alphabet Inc. / Google Analytics / HTTP cookie / Privacy policy / HTTPS

Microsoft Word - 1.10R state ver 1 - (Rev. AprilPrivacy Policy Statement for CFF.org - Approved by Peter Nagel then chan

Add to Reading List

Source URL: communityfirstfoundation.org

Language: English - Date: 2016-04-01 14:27:10
164Computing / Cryptography / Cryptographic protocols / Internet / Secure communication / Internet protocols / Cryptographic software / Internet Standards / Transport Layer Security / OpenSSL / GnuTLS / Cipher suite

Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 06:14:04
165Computing / Internet / Network architecture / Internet protocols / Internet Standards / Internet security / Domain name system / Cryptographic protocols / Border Gateway Protocol / Anycast / Router / Virtual private network

Communication Networks Spring 2016 Two weeks ago on Communication Networks Laurent Vanbever

Add to Reading List

Source URL: comm-net.ethz.ch

Language: English
166Formal languages / Interpretation / Philosophy of mind / Semantics / Communications protocol / Model theory / Digital signature

Programming Cryptographic Protocols? Joshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, and Brian T. Sniffen The MITRE Corporation Abstract. Cryptographic protocols are useful for trust engineering in

Add to Reading List

Source URL: evenmere.org

Language: English - Date: 2008-06-23 12:11:50
167Computing / Computer architecture / Computer network security / Wireless networking / IEEE 802.11 / Local area networks / Cryptographic protocols / Wireless / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Ubuntu / Cracking of wireless networks

Connecting to the Rovernet WPA2 Secured Wireless Network with with UbuntuIntreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
168Computer network security / Cryptographic protocols / Wi-Fi / IEEE 802.11 / Wireless networking / Wi-Fi Protected Access / IEEE 802.1X / IEEE 802.11i-2004 / AirPort / Wireless security / Cracking of wireless networks

Connecting to the Rovernet WPA2 Secured Wireless Network with the Mac OS XTiger) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
169Internet protocols / Cryptographic protocols / Internet Standards / Secure communication / Network architecture / Border Gateway Protocol / Network address translation / Transport Layer Security / HTTPS / Internet protocol suite / Virtual private network

Communication Networks Spring 2016 Laurent Vanbever www.vanbever.eu

Add to Reading List

Source URL: comm-net.ethz.ch

Language: English - Date: 2016-05-22 14:43:12
170Internet Standards / Computer networks / Cryptographic protocols / Internet protocols / Routing protocols / Border Gateway Protocol / AS3 / AS2 / Routing / AS1

Stable Internet Routing Without Global Coordination Jennifer Rexford Lixin Gao Computer Science Smith College

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2005-01-14 14:19:59
UPDATE