HTTP Secure

Results: 1425



#Item
231Security / Cyberwarfare / Electronic commerce / Transport Layer Security / Vulnerability / HTTP Secure / Cryptographic protocols / Secure communication / Computing

SSLv3 POODLE Vulnerability Frequently Asked Questions Over the last week, the info-security and IT communities exploded about the SSL POODLE vulnerability. We expect that over the course of the next few weeks you will b

Add to Reading List

Source URL: security.radware.com

Language: English - Date: 2014-10-15 17:25:36
232Internet standards / Internet protocols / Cryptographic protocols / Secure communication / Public-key cryptography / Transmission Control Protocol / Lightweight Directory Access Protocol / Transport Layer Security / Certificate authority / Cryptography / Computing / Internet

SSL Protocol The Transmission Control Protocol/Internet Protocol (TCP/IP) governs the transport and routing of data over the Internet. Other protocols, such as the Hypertext Transport Protocol (HTTP), Lightweight Directo

Add to Reading List

Source URL: www.cryptoheaven.com

Language: English - Date: 2011-03-01 12:16:22
233Computing / Internet protocols / Security / Internet standards / Transport Layer Security / Cipher suite / HTTP Secure / Public-key cryptography / Key / Cryptography / Secure communication / Cryptographic protocols

SSL and TLS An Overview of A Secure Communications Protocol Simon Horman aka Horms

Add to Reading List

Source URL: horms.net

Language: English - Date: 2005-04-17 17:27:10
234Computing / Identity management / Social issues / Internet / HTTP cookie / Information privacy / P3P / In re Gateway Learning Corp. / Privacy / Ethics / Internet privacy

Privacy Policy We, at Passportcard, take your privacy seriously. This Privacy Policy explains how we will use information about you and the steps we take to ensure your information is kept secure and confidential. We fol

Add to Reading List

Source URL: www.passportcard.com

Language: English - Date: 2014-10-29 14:48:00
235Temporal logic / Model theory / Propositional calculus / Mathematical logic / Interpretation / Substitution / Well-formed formula / Logic / Formal languages / Linear temporal logic

Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2004-05-03 19:17:14
236Open Library / HTTP Secure / Library science / Information / Digital libraries / Library 2.0 / Internet Archive

  Let Us Host Your Content! Make your book available for free via OpenLibrary.org OpenLibrary.org is a user-editable project. You can create a free account on Open Library to create a page for your book.

Add to Reading List

Source URL: blog.openlibrary.org

Language: English - Date: 2014-08-12 15:57:39
237Technology / Electronic commerce / Payment systems / Mobile payments / PayPal / Message transfer agent / Gmail / Anti-spam techniques / Email / Computing / Computer-mediated communication

PayPal Simple Sales Tool _http://andymoore.info/paypal-simple-sales-tool/_ Technical Requirements: Web hosting that supports PHP; I’ve not tested this on anything other than variants of PHP 5. cURL: to enable secure p

Add to Reading List

Source URL: andymoore.info

Language: English
238Computing / Public-key cryptography / Internet / Security / Internet standards / Transport Layer Security / Buffer overflow / HTTP Secure / Transmission Control Protocol / Cryptographic protocols / Secure communication / Electronic commerce

Tales from the Crypt: fingerprinting attacks on encrypted channels by way of retainting Michael Valkering Asia Slowinska

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:38:52
239Key management / Secure communication / Internet / Electronic commerce / Security / HTTP Secure / Public key certificate / Netscape / Certificate authority / Cryptographic protocols / Public-key cryptography / Computing

Trusted Paths for Browsers ZISHUANG (EILEEN) YE, SEAN SMITH, and DENISE ANTHONY Dartmouth College Computer security protocols usually terminate in a computer; however, the human-based services which they support usually

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:24:00
240Cryptographic protocols / Secure communication / Internet standards / HTTP / Transport Layer Security / HTTP Secure / Hypertext Transfer Protocol / Reverse proxy / Dynamic SSL / Computing / Internet / Network architecture

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T. Lesniewski-Laas S.B., Massachusetts Institute of Technology (2001)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:14
UPDATE