Cryptographic protocols

Results: 3642



#Item
671Internet standards / Cryptographic protocols / Computer data / AS2 / Internet protocols / AS3 / SSH File Transfer Protocol / Email / File Transfer Protocol / Computing / Internet / Data

Connecting to the EMEA ESTRI Gateway using an AS2 or AS3 compatible product. You will need to provide the following information to the EMEA, and we will create a profile on our system for you. The information about our

Add to Reading List

Source URL: esubmission.ema.europa.eu

Language: English - Date: 2015-05-07 06:59:37
672Public-key cryptography / Internet protocols / Electronic commerce / Adaptive chosen-ciphertext attack / Transport Layer Security / Daniel Bleichenbacher / RSA / Padding / HTTP Secure / Cryptography / Secure communication / Cryptographic protocols

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Christopher Meyer, Juraj Somorovsky, Eugen Weiss, and Jörg Schwenk, Ruhr-University Bochum; Sebastian Schinzel, Münster University of App

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-10 20:13:35
673Secure communication / Internet / Data / Internet protocols / Internet standards / Transport Layer Security / Security Assertion Markup Language / Password / SAML 2.0 / Computing / Teleconferencing / Cryptographic protocols

Zoom Security White Paper May 2013 Zoom offers the first Unified Meeting Experience (UMX), a cloud service that provides a 3-in-1 meeting platform with HD video conferencing, mobility and web meetings. UMX also offers th

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-04-13 09:04:08
674Cryptographic protocols / Electronic commerce / Secure communication / Smart cards / Payment systems / Security token / HTTP Secure / Password / Phishing / Computing / Security / Internet

Secure Confirmation of Sensitive Transaction Data in Modern Internet Banking Services* Thomas Weigold IBM Research - Zurich Abstract— In recent years attacks on Internet banking services

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2012-07-04 04:10:11
675Cryptographic protocols / Internet protocols / Tunneling protocols / Virtual private network / Tor / Data center / IPsec / Wireless security / Information security audit / Computing / Computer network security / Internet privacy

Keeping Our Customers’ Data Safe Security is incredibly important at PagerDuty. As an operations performance platform for some of the world’s largest companies, PagerDuty has a responsibility to its customers to prov

Add to Reading List

Source URL: iqm7l1pa7bn3d42rc278rat568.wpengine.netdna-cdn.com

Language: English - Date: 2015-05-08 17:12:32
676Electric power distribution / Electric power / Cryptographic protocols / Measuring instruments / Internet protocols / Smart meter / Smart grid / Electricity meter / Key size / Cryptography / Technology / Energy

Understand Electronic-Meter Design to Better Craft Intelligent and Secure Systems driving trust ™

Add to Reading List

Source URL: www.insidesecure.com

Language: English
677Identity management systems / Identity management / Security Assertion Markup Language / Electronic commerce / Cryptographic protocols / Public-key cryptography / WS-Security / XML Signature / Transport Layer Security / Computing / Cryptography / System software

Interface specifications EID SCHEME Version:

Add to Reading List

Source URL: www.eid-stelsel.nl

Language: English - Date: 2014-12-03 06:13:42
678Security / Computer security / Cyberwarfare / Security token / Cryptographic protocols / Public-key cryptography / X.509

           

Add to Reading List

Source URL: download.nabto.com

Language: English - Date: 2015-05-07 08:03:02
679Electronic engineering / Network access / Computing / Wireless access point / Computer network security / Service set / Cryptographic protocols / Nintendo Wi-Fi USB Connector / Wi-Fi Protected Setup / Wi-Fi / Wireless networking / Technology

RTX41xx Wi-Fi Module Module variants covered by this document: RTX4100 RTX4140

Add to Reading List

Source URL: www.rtx.dk

Language: English - Date: 2015-04-15 06:00:31
680Secure communication / Microsoft Forefront Threat Management Gateway / HTTP / Network architecture / HTTP Secure / Windows Server / Proxy server / Computing / Internet / Cryptographic protocols

Learn How To Configure Your ISA 2004 Server To Block HTTP Response Splitting Attacks HTTP Response Splitting is a browser-redirection technique that is used to hijack a browser session and either steal information or inj

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2004-08-25 19:37:57
UPDATE