HTTP Secure

Results: 1425



#Item
311Cryptographic protocols / Wireless access points / Smartphones / HTTP Secure / Certificate authority / Wi-Fi / Captive portal / Android / X.509 / Cryptography / Public-key cryptography / Key management

POSTER: Android + Open Wi-Fis = Broken SSL? Sascha Fahl Dept. of Computer Science Leibniz University Hannover 1.

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:52
312Public key certificate / HTTP Secure / Cryptography / Computer security / Anonymity / Electronic commerce / Secure communication / Security

Michael Waidner () IBM Zurich Research Laboratory CH8803 Rüschlikon -- Schweiz Secure Electronic Marketplace for Europe

Add to Reading List

Source URL: www.semper.org

Language: English
313Computer security / Cryptographic protocols / Secure communication / Smartphones / HTTP Secure / Ransomware / Privilege escalation / Cipher / China Internet Network Information Center / Malware / Computing / Cyberwarfare

Security Now! #Q&A #210  This week on Security Now! ● ● ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-04-14 13:01:48
314Secure communication / Data / Information / Transport Layer Security / Cipher suite / HTTP Secure / STARTTLS / Server Name Indication / Extensible Messaging and Presence Protocol / Cryptographic protocols / Internet protocols / Computing

draft-ietf-uta-tls-bcp-11 - Recommendations for Secure Use of TLS and DTLS

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-02-23 04:04:03
315DigiNotar / Certificate authority / Extended Validation Certificate / CAcert.org / HTTP Secure / Transport Layer Security / Comodo Group / Public key certificate / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Kai Engert https://kuix.de

Add to Reading List

Source URL: kuix.de

Language: English - Date: 2012-02-06 06:51:49
316Secure communication / Data / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / Cipher suite / SSL acceleration / HTTP Secure / Cryptography / Cryptographic protocols / Computing

The Design and Implementation of Protocol-Based Hidden Key Recovery Eu-Jin Goh1 , Dan Boneh1 , Benny Pinkas2 , and Philippe Golle1 1 Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-07-21 17:54:06
317Archive formats / Cross-platform software / DEFLATE / Gzip / Internet protocols / Zlib / Lossless data compression / LZ77 and LZ78 / Huffman coding / Software / Data compression / Computing

The CRIME attack HTTPS:// Secure HTTP HTTPS provides: ● Confidentiality (Encryption), ● Integrity (Message Authentication Code),

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2012-09-26 10:02:07
318Computer network security / Secure Shell / Single sign-on / Kerberos / Authentication / Password / Two-factor authentication / Security and safety features new to Windows Vista / Security / Computer security / Cryptography

SHAD: A Human-Centered Security Architecture for the Plan B Operating System ∗ Enrique Soriano, Francisco J. Ballesteros, and Gorka Guardiola Laboratorio de Sistemas – Universidad Rey Juan Carlos Madrid, Spain. http:

Add to Reading List

Source URL: lsub.org

Language: English - Date: 2014-05-08 10:53:15
319Secure communication / Key management / Public-key cryptography / Electronic commerce / HTTP Secure / Transport Layer Security / Stunnel / SSL acceleration / Load balancing / Cryptography / Computing / Cryptographic protocols

Recent work in OpenBSD relayd SSL Interception and other Advancements Reyk Floeter () March 2013 Abstract

Add to Reading List

Source URL: www.openbsd.dk

Language: English - Date: 2013-04-02 16:02:24
320Ubuntu / Ceph / Sudo / Secure Shell / Quickly / Software / Computing / Computer architecture

Teuthology Presentedimage credit: http://www.flickr.com/photos/peterblapps/ Ceph

Add to Reading List

Source URL: eagain.net

Language: English - Date: 2015-04-13 22:04:27
UPDATE