Domain Name System Security Extensions

Results: 699



#Item
601Internet standards / Internet protocols / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Man-in-the-middle attack / Key management / Internet / Cryptography / Computing

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prev

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-07-28 17:01:12
602Domain name system / Internet protocols / Networks / DNSSEC / Domain Name System Security Extensions / Content delivery network / Downtime / Server / Computing / Internet / Concurrent computing

/delivers/ CASE STUDY Hershey’s: The Sweetness of 100% Uptime When it comes to chocolate, one word says it all: Hershey’s. It is a global confectionery leader known for bringing

Add to Reading List

Source URL: dyn.com

Language: English - Date: 2014-06-04 11:50:20
603Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
604Key management / Public-key cryptography / Network architecture / Computing / Internet standards / Domain Name System Security Extensions / Afilias / .info / Whois / Internet / Domain name system / Internet protocols

PDF Document

Add to Reading List

Source URL: pir.org

Language: English - Date: 2014-04-03 14:48:30
605Internet protocols / Public-key cryptography / Network architecture / Computing / Internet standards / Domain Name System Security Extensions / Afilias / .info / Whois / Internet / Key management / Domain name system

PDF Document

Add to Reading List

Source URL: pir.org

Language: English - Date: 2014-04-03 14:48:24
606Key management / Public-key cryptography / Network architecture / Computing / Internet standards / Domain Name System Security Extensions / Afilias / .info / Whois / Internet / Domain name system / Internet protocols

1. INTRODUCTION 1.1. Overview This document was created using the template provided under the current practicing documentation. 1 This document comprises the practices utilized by Afilias, as Public Interest Registry’s

Add to Reading List

Source URL: pir.org

Language: English - Date: 2014-04-03 14:48:08
607Internet / Internet protocols / Network architecture / Computing / Certificate authorities / Thawte / Domain Name System Security Extensions / Public key certificate / Domain name / Public-key cryptography / Domain name system / Key management

PDF Document

Add to Reading List

Source URL: www.thawte.com

Language: English - Date: 2013-12-13 16:05:11
608Key management / Internet protocols / Certificate authorities / GeoTrust / Domain Name System Security Extensions / X.509 / Zone file / Public key certificate / Domain name / Cryptography / Public-key cryptography / Domain name system

PDF Document

Add to Reading List

Source URL: www.geotrust.com

Language: English - Date: 2013-12-12 22:59:53
609Internet governance / Network architecture / Internet protocols / Internet in the United States / ICANN / United States Department of Commerce / Domain Name System Security Extensions / Generic top-level domain / Top-level domain / Domain name system / Internet / Computing

PDF Document

Add to Reading List

Source URL: cyber.law.harvard.edu

Language: English - Date: 2010-11-17 21:16:14
610Computing / Domain Name System Security Extensions / Name server / Google Public DNS / Denial-of-service attack / OpenDNS / IP address spoofing / DNS spoofing / Anycast / Domain name system / Internet / Network architecture

May 8, 2013 To: IT Security Staff, Network Administrators, and DNS Administrators (a CIO version of this Alert is available at http://www.ren-isac.net/alerts.html) REN-ISAC ALERT: Prevent your institution from being an u

Add to Reading List

Source URL: www.ren-isac.net

Language: English - Date: 2013-05-08 11:03:00
UPDATE