Domain Name System Security Extensions

Results: 699



#Item
511Network architecture / Computing / Key management / Internet standards / DNSSEC / Domain Name System Security Extensions / Verisign / Domain name system / Internet / Internet protocols

Abstract - Verifying Keys through Publicity and Communities of Trust: Quantifying Off-Axis Corroboration

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 13:26:24
512Computing / Internet protocols / Computer network security / Internet standards / DNSSEC / Domain Name System Security Extensions / Name server / DNS spoofing / DMZ / Domain name system / Internet / Network architecture

Federal Network Security Federal Interagency Technical Reference Architectures Domain Name System (DNS) Security Reference Architecture

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-08-03 12:27:13
513Network architecture / Computing / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Internet / Domain name system / Internet protocols

DNSSEC Roadmap Prepared for: Department of Homeland Security DNSSEC Deployment Initiative Prepared by:

Add to Reading List

Source URL: www.dnssec-deployment.org

Language: English - Date: 2014-07-08 16:38:33
514Federal Information Security Management Act / Security Content Automation Protocol / National Institute of Standards and Technology / FIPS 140-2 / Institute for Information Infrastructure Protection / Security controls / Information Security Automation Program / Information security / Domain Name System Security Extensions / Computer security / Security / Computing

Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-12-21 10:59:19
515Computing / Internet standards / Domain name system / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Server / Transport Layer Security / Transmission Control Protocol / Internet protocols / Internet / Network architecture

Deployment Models for Backup Certificate Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-10 10:53:31
516Network architecture / Verisign / Load balancing / Content delivery network / Domain Name System Security Extensions / Root name server / Denial-of-service attack / Domain name / DNS root zone / Computing / Domain name system / Internet

VRSN_logo_vertical_CMYK_vector

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-03-27 16:55:04
517Internet protocols / Cryptographic protocols / Internet standards / Domain Name System Security Extensions / X.509 / Certificate authority / Public key certificate / Online Certificate Status Protocol / Transport Layer Security / Cryptography / Public-key cryptography / Key management

REDUCING THE X.509 ATTACK SURFACE WITH DNSSEC’S DANE MARCH[removed]VerisignInc.com

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2012-03-28 13:55:02
518Internet standards / Internet protocols / Network architecture / DNSSEC / Domain Name System Security Extensions / Computing / Public key certificate / Key management / Public-key cryptography / Internet

Abstract - Transport Security Policies: A broad framework for new proposals in server trust on the web

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 12:37:27
519Computing / Domain Name System Security Extensions / Root name server / DNS root zone / Name server / Extension mechanisms for DNS / Transmission Control Protocol / .org / Anycast / Domain name system / Internet / Network architecture

D N S S E C I N D U S T R Y C O A L I T I O N

Add to Reading List

Source URL: www.dnssec-deployment.org

Language: English - Date: 2014-07-08 16:38:30
520Computer security / Computing / MAAWG / Internet privacy / Domain Name System Security Extensions / Internet / Computer network security / National Strategy for Trusted Identities in Cyberspace

From: Messaging Anti-Abuse Working Group (MAAWG) Date: July 19, 2010 Subject: Comments on the National Strategy for Trusted Identities in Cyberspace Thank you for the opportunity to review and comment on the National Str

Add to Reading List

Source URL: www.maawg.org

Language: English - Date: 2010-11-23 17:52:45
UPDATE