HTTP Secure

Results: 1425



#Item
361Cross-platform software / HTTP / Portable software / Web 2.0 / HTTP Secure / HTTP cookie / JavaScript / Gmail / Google Chrome / Software / Computing / Internet privacy

Protecting Sensitive Web Content from Client-side Vulnerabilities with C RYPTONs Xinshu Dong Zhaofeng Chen∗

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
362Insurance / Economy of India / Coral reef / Health insurance / Government / Physical geography / Financial institutions / Institutional investors / Financial economics

Insights Secure – 2015 – Compilation Dec 22 to Dec 27, 2014 INSIGHTS SECURE22nd – 27th dec 14) [The Undercover Group] http://www.insightsonindia.com

Add to Reading List

Source URL: www.insightsonindia.com

Language: English - Date: 2014-12-30 05:09:11
363Cross-site scripting / HTTP cookie / Application security / JavaScript / Hypertext Transfer Protocol / Session / Application server / Transport Layer Security / Digest access authentication / Computing / HTTP / Computer security

Developing Secure Web Applications White Paper Izhar Bar-Gad Amit Klein

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-11-02 16:08:47
364Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: nerdoholic.org

Language: English - Date: 2013-02-18 19:54:05
365Secure communication / Security / Internet protocols / Internet standards / HTTP / Transport Layer Security / HTTP Secure / Password / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Computing

Crypton: Zero-Knowledge Application Framework Cam Pedersen David Dahl Engineer, Crypton

Add to Reading List

Source URL: crypton.io

Language: English - Date: 2014-11-11 16:05:14
366Denial-of-service attacks / Internet Relay Chat / Cryptographic protocols / LOIC / HTTP Secure / Man-in-the-middle attack / Certificate authority / Denial-of-service attack / Ident / Cryptography / Public-key cryptography / Key management

CIS 331 Introduction to Networks & Security March 5, 2015 Homework 4: HTTPS, Denial of Service

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-03-14 15:46:02
367Cryptographic protocols / Electronic commerce / Secure communication / Public key certificate / Transport Layer Security / X.509 / Root certificate / Certificate authority / HTTP Secure / Cryptography / Public-key cryptography / Key management

Security Certificates an overview Xavier Belanger January 24, 2015

Add to Reading List

Source URL: www.ellendhel.net

Language: English - Date: 2015-01-27 08:11:19
368Cryptographic protocols / Secure communication / HTTP / HTTP Secure / Certificate authority / Public key certificate / Client–server model / Transport Layer Security / FTPS / Cryptography / Key management / Public-key cryptography

Securing Web Servers against Insider Attack Shan Jiang Sean Smith Kazuhiro Minami

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:19
369Internet / Network architecture / Internet protocols / Internet standards / HTTP / Transport Layer Security / Cipher suite / Stunnel / HTTP Secure / Computing / Cryptographic protocols / Secure communication

SSL splitting: securely serving data from untrusted caches Chris Lesniewski-Laas and M. Frans Kaashoek {ctl,kaashoek}@mit.edu Laboratory for Computer Science Massachusetts Institute of Technology

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:17
370Disk encryption / Cryptographic protocols / Cross-platform software / TrueCrypt / Secure communication / AES implementations / HTTP Secure / Man-in-the-middle attack / Fortuna / Software / Cryptography / Cryptographic software

Security Now! #The TrueCrypt Audit  ( Elaine is fine! -- It was apparently just a transient eMail glitch. All is wel! ) This week on Security Now! ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-04-07 13:11:05
UPDATE