Datagram Transport Layer Security

Results: 55



#Item
41Internet / Cryptographic protocols / Cryptographic software / Internet standards / Secure communication / Datagram Transport Layer Security / GnuTLS / Transport Layer Security / Domain Name System Security Extensions / Internet protocols / Cryptography / Computing

On the Design and Implementation of Secure Network Protocols Nadhem J. AlFardan Thesis submitted to

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2014-05-22 05:10:55
42Computing / Internet standards / Cryptographic protocols / Secure communication / Stream Control Transmission Protocol / Streaming / Datagram Transport Layer Security / Datagram Congestion Control Protocol / Transport Layer Security / Internet protocols / Network architecture / Data

Design and Implementation of SCTP-aware DTLS R. Seggelmann1 , M. T¨uxen2 and E. Rathgeb3 1 M¨unster University of Applied Sciences, Steinfurt, Germany - [removed] 2

Add to Reading List

Source URL: robin-seggelmann.de

Language: English - Date: 2011-02-25 05:00:02
43Internet / Internet standards / Cryptographic protocols / Secure communication / Electronic commerce / Transport Layer Security / Transmission Control Protocol / Stream Control Transmission Protocol / Cipher suite / Internet protocols / Network architecture / Computing

Version 1.0 Robin Seggelmann ([removed]) License: UVM, CC-BY-ND In this document the Datagram Transport Layer Security (DTLS) protocol, a modifcation of the Transmission Control Protocol (TCP) for unrelia

Add to Reading List

Source URL: robin-seggelmann.de

Language: English - Date: 2011-05-13 04:29:27
44Cryptographic protocols / Cryptographic software / Electronic commerce / Datagram Transport Layer Security / Transport Layer Security / GnuTLS / OpenSSL / Padding / RSA / Cryptography / Internet protocols / Computing

Plaintext-Recovery Attacks Against Datagram TLS Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009, kenny.pater

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-01-10 15:59:35
45Internet protocols / Datagram Transport Layer Security / Data / Information / Computing / Telephony / Cryptographic protocols / Back-to-back user agent

DTLS-­‐SRTP  Handling  in  SIP   B2BUAs dra$-­‐ram-­‐straw-­‐b2bua-­‐dtls-­‐srtp IETF-­‐90    

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2014-08-21 17:46:40
46Cryptographic software / Computer security / Computer network security / CVSS / OpenSSL / Vulnerability / IBM AIX / Datagram Transport Layer Security / X.509 / Cryptography / Cryptographic protocols / Public-key cryptography

_http://aix.software.ibm.com/aix/efixes/security/openssl_advisory7.doc_ _https://aix.software.ibm.com/aix/efixes/security/openssl_advisory7.doc_ _ftp://aix.software.ibm.com/aix/efixes/security/openssl_advisory7.doc_ Titl

Add to Reading List

Source URL: aix.software.ibm.com

Language: English - Date: 2014-04-29 13:01:39
47Internet / Network architecture / Internet standards / Transmission Control Protocol / Transport layer / Honeypot / User Datagram Protocol / Network intrusion detection system / Denial-of-service attack / Computer network security / Computing / Internet protocols

Honeycomb – Creating Intrusion Detection Signatures Using Honeypots Christian Kreibich, Jon Crowcroft University of Cambridge Computer Laboratory JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom firstname.lastname

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-01-16 15:06:05
48Networking hardware / Computer hardware / Cryptographic software / HP Networking / Vulnerability / Datagram Transport Layer Security / OpenSSL / ProCurve / Computing / Hewlett-Packard / Technology

Hewlett-Packard Company 3000 Hanover Street Palo Alto, CA[removed]hp.com Security Advisory

Add to Reading List

Source URL: h17007.www1.hp.com

Language: English - Date: 2014-06-09 16:37:33
49Internet / Internet standards / Cryptographic protocols / Secure communication / Electronic commerce / Transport Layer Security / Transmission Control Protocol / Stream Control Transmission Protocol / Cipher suite / Internet protocols / Network architecture / Computing

Version 1.0 Robin Seggelmann ([removed]) License: UVM, CC-BY-ND In this document the Datagram Transport Layer Security (DTLS) protocol, a modifcation of the Transmission Control Protocol (TCP) for unrelia

Add to Reading List

Source URL: sctp.fh-muenster.de

Language: English - Date: 2011-05-13 04:25:13
50Computing / Datagram Transport Layer Security / Information / OpenSSL / Cryptographic software / Cryptographic protocols / Internet protocols

Mitigations for OpenSSL TLS/DTLS Heartbeat Extension Vulnerability A serious vulnerability (CVE[removed]exists in OpenSSL’s implementation of the TLS/DTLS heartbeat extension. Exploitation of this vulnerability resu

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-04-14 16:12:13
UPDATE