End-to-end encryption

Results: 47



#Item
11Transport Layer Security / Public key infrastructure / Cryptographic protocols / Secure communication / Public-key cryptography / Cisco Systems / Key management / Volume license key / Spark / Man-in-the-middle attack / End-to-end encryption / Certificate authority

White Paper Cisco Spark Security and Privacy Version 1.0 (JuneCisco® Spark is a cloud collaboration platform that provides messaging, calling, and

Add to Reading List

Source URL: www.cisco.com

Language: English
12Public-key cryptography / Public key infrastructure / Cryptography / Ko / Certificate authority / End-to-end encryption

Efficient Key Authentication Service for Secure End-to-end Communications Mohammad Etemad Alptekin Küpçü

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
13

ETS Corporation Software Developer / Jr. DBA $80k – $100k/year Full Time Professional Position Headquartered in Sterling, Virginia. Duties Design and develop end-to-end encryption payment system that can be integrated

Add to Reading List

Source URL: www.etsms.com

Language: English - Date: 2014-07-28 11:44:31
    14Cryptography / Software / Computing / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Messages / RSA / End-to-end encryption / Block cipher mode of operation / Known-plaintext attack

    Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

    Add to Reading List

    Source URL: isi.jhu.edu

    Language: English - Date: 2016-03-21 17:23:50
    15Cryptography / Instant messaging clients / Cryptographic software / Communication software / Cross-platform software / WhatsApp / Signal / End-to-end encryption / Public-key cryptography / Key / Man-in-the-middle attack / Transport Layer Security

    WhatsApp Encryption Overview Technical white paper April 4, 2016

    Add to Reading List

    Source URL: www.whatsapp.com

    Language: English
    16

    [git] • Branch: master @ 88d0df1 • Release: v0) Head tags: v0.2.3 Key Security Features 1Password for Teams offers a number of notable security features, including True end-to-end encryption All cryp

    Add to Reading List

    Source URL: www.1password.com

    Language: English - Date: 2016-04-13 14:05:22
      17Cryptography / Email authentication / Cryptographic software / Mass surveillance / Internet privacy / Crypto Wars / Email encryption / Encryption / End-to-end encryption / BitLocker / National Security Agency / Surveillance

      Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

      Add to Reading List

      Source URL: cyber.law.harvard.edu

      Language: English - Date: 2016-01-31 21:23:48
      18Instant messaging clients / Cross-platform software / Videotelephony / Online chat / Cryptography / WhatsApp / End-to-end encryption / Short Message Service / Text messaging / Transport Layer Security / Windows Live Messenger / Instant messaging

      BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications Ahmet Talha Ozcan1 , Can Gemicioglu2 , Kaan Onarlioglu3 , Michael Weissbacher3 , Collin Mulliner3 , William Robertson3 , and Engin Kirda3 1

      Add to Reading List

      Source URL: fc15.ifca.ai

      Language: English - Date: 2015-01-11 00:32:53
      19Secure communication / Cryptographic protocols / Internet Standards / Computer network security / Transport Layer Security / HTTPS / OpenSSL / Cipher suite / Handshaking / End-to-end encryption / Middlebox / Extensible Authentication Protocol

      Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

      Add to Reading List

      Source URL: conferences.sigcomm.org

      Language: English - Date: 2015-07-29 16:55:02
      20Wireless networking / Technology / Computing / IEEE 802.11 / Wi-Fi / Encryption / Public-key cryptography / Bluetooth / Wireless

      Proposal for EU legislation Mandatory anonymised, authenticated and end-to-end encrypted communications in all tele­pho­ny and computing devices sold after 201x. Status: DRAFT 0.13

      Add to Reading List

      Source URL: youbroketheinternet.org

      Language: English - Date: 2015-09-29 18:17:30
      UPDATE