GnuTLS

Results: 30



#Item
11Secure communication / Internet protocols / Cryptographic protocols / Transport Layer Security / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK / TLS-SRP / GnuTLS / Cipher suite

PDF Document

Add to Reading List

Source URL: bh.ht.vc

Language: English - Date: 2014-07-18 09:42:13
12Secure communication / Computing / Internet protocols / Security / Internet standards / Transport Layer Security / Cipher suite / GnuTLS / HTTP Secure / Cryptography / Cryptographic protocols / Cryptographic software

2013 IEEE Symposium on Security and Privacy Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan∗ , C´edric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , Pierre-Yves Strub‡ ∗ IN

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:46
13Cryptographic protocols / Computing / GnuTLS / Internet protocols / Secure communication / Internet standards / Comparison of TLS Implementations / TLS-SRP / Cryptographic software / System software / Cryptography

Introduction to GnuTLS Simon Josefsson http://josefsson.org/ http://www.gnutls.org/

Add to Reading List

Source URL: josefsson.org

Language: English - Date: 2012-09-11 01:52:01
14Internet protocols / Data / Secure communication / Public-key cryptography / Internet standards / Transport Layer Security / Cipher suite / HTTP Secure / GnuTLS / Cryptography / Cryptographic protocols / Computing

It Is Time to Redesign Transport Layer Security Francisco Corella, PhD Karen Lewison, MD

Add to Reading List

Source URL: pomcor.com

Language: English - Date: 2014-01-12 22:33:51
15Secure communication / Cryptographic protocols / Electronic commerce / Transport Layer Security / HTTP Secure / Public key certificate / Certificate authority / X.509 / GnuTLS / Cryptography / Public-key cryptography / Key management

The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software Martin Georgiev Subodh Iyengar

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2012-10-13 15:43:00
16Cryptographic software / Secure communication / Data / Information / Internet standards / Transport Layer Security / GnuTLS / CyaSSL / Cipher suite / Cryptographic protocols / Internet protocols / Computing

1 A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche∗ , Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , Cedric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , P

Add to Reading List

Source URL: www.smacktls.com

Language: English - Date: 2015-03-05 00:10:02
17Computing / Data / Secure communication / Cryptographic software / Internet standards / GnuTLS / Cipher suite / X.509 / Public-key cryptography / Cryptographic protocols / Cryptography / Internet protocols

This document includes text contributed by Nikos Mavrogiannopoulos, Simon Josefsson, Daiki Ueno, Carolin Latze, Alfredo Pironti, Ted Zlatanov and Andrew McDonald. Several corrections are due to Patrick Pelletier and Andr

Add to Reading List

Source URL: www.gnutls.org

Language: English - Date: 2015-04-08 06:00:06
18Computing / GnuTLS / GNU Guile / Scheme / Guile / Comparison of TLS Implementations / Cryptographic software / Military personnel / Software

GnuTLS-Guile Guile binding for GNU TLS for version[removed], 23 March 2015 This manual is last updated 23 March 2015 for version[removed]of GnuTLS. c[removed], 2014 Free Software Foundation, Inc.

Add to Reading List

Source URL: www.gnutls.org

Language: English - Date: 2015-03-30 01:33:21
19Secure communication / Cryptographic protocols / Electronic commerce / Transport Layer Security / HTTP Secure / Public key certificate / Certificate authority / X.509 / GnuTLS / Cryptography / Public-key cryptography / Key management

The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software Martin Georgiev Subodh Iyengar

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2012-10-13 15:43:00
20Cryptographic software / Cryptographic protocols / Secure communication / Transport Layer Security / X.509 / GnuTLS / Certificate authority / Public key certificate / HTTP Secure / Cryptography / Public-key cryptography / Key management

Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations Chad Brubaker ∗ †

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2014-03-15 20:40:12
UPDATE