HTTP Secure

Results: 1425



#Item
841Public-key cryptography / Electronic commerce / Secure communication / Access control / X.509 / Public key certificate / HTTP Secure / X.500 / Transport Layer Security / Cryptography / Security / Cryptographic protocols

Smart Certi cates: Extending X.509 for Secure Attribute Services on the Web Joon S. Park and Ravi Sandhu The Laboratory for Information Security Technology Information and Software Engineering Department George Mason Uni

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
842Internet privacy / European Data Protection Supervisor / Information privacy / HTTP cookie / Privacy-enhancing technologies / Privacy / Ethics / Computing

IPEN - The Internet Privacy Engineering Network Workshop: Engineering Privacy into Internet Services and Applications Date: Friday, 26 September 2014

Add to Reading List

Source URL: secure.edps.europa.eu

Language: English - Date: 2014-09-26 07:26:04
843Indiana / Bursar / Purdue University / Password / HTTP Secure / Online shopping / Tippecanoe County /  Indiana / Electronic commerce / Geography of Indiana

BURSAR’S OFFICE[removed] [removed] WWW.PURDUE.EDU/BURSAR PURDUE UNIVERSITY – WEST LAFAYETTE

Add to Reading List

Source URL: www.purdue.edu

Language: English - Date: 2013-07-16 14:06:42
844Cryptographic protocols / Internet protocols / Internet standards / Domain Name System Security Extensions / Public key certificate / X.509 / HTTP Secure / Cryptography / Public-key cryptography / Key management

Why Provable Transparency is Useful Against Surveillance Ben Laurie, Google (benl@google,com), 11 Jan 2014. Background Certificate Transparency (RFC 6962) is an example of a general mechanism which perm

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
845Cryptographic protocols / Secure communication / HTTP / Software / System software / Client-side / HTTP Secure / Cryptocat / Password / Computing / Cryptographic software / Internet privacy

SECURITY Building Web Applications on Top of Encrypted Data Using Mylar R A L U C A A D A P O PA , E M I LY S TA R K , J O N A S H E L F E R , S T E V E N VA L D E Z , NICKOL AI ZELDOVICH, M . FR ANS K A ASHOEK , AND HAR

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
846Secure communication / Web hosting / HTTP / Internet protocols / Cryptographic protocols / Transport Layer Security / Server Name Indication / Virtual hosting / HTTP Secure / Computing / Internet / World Wide Web

Virtual Host Confusion: Weaknesses and Exploits Black Hat 2014 Report* Antoine Delignat-Lavaud Karthikeyan Bhargavan

Add to Reading List

Source URL: bh.ht.vc

Language: English - Date: 2014-08-28 08:51:54
847Data / Secure communication / Internet protocols / Computer network security / HTTP / HTTP Secure / Opportunistic encryption / Transport Layer Security / Cryptographic protocols / Computing / Cryptography

Trust  Issues  with  Opportunistic  Encryption   Scott  Rose,  Stephen  Nightingale,  Doug  Montgomery   {scottr,  night,  [removed]}   National  Institute  of  Sta

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
848Google Chrome / International Standard Bible Encyclopedia / HTTP Secure / Internet / Software / Computing / STAR

ISBE Instructional Technology Update - September 2014

Add to Reading List

Source URL: www.isbe.net

Language: English - Date: 2014-09-09 15:52:47
849Computing / HTTP / Crime prevention / National security / Password / Personally identifiable information / HTTP Secure / Online shopping / Computer security / Security / Secure communication / Electronic commerce

Information and Data Security Policies Security is important to us at The Federal Tax Authority™ (“FedTax”, “we,” or “us”), and we have prepared this Security Policy to explain to you how we secure your dat

Add to Reading List

Source URL: taxcloud.net

Language: English - Date: 2014-06-17 22:00:22
850Computing / URI schemes / Network architecture / Internet standards / Internet protocols / Transport Layer Security / HTTP Secure / Opportunistic encryption / Uniform resource identifier / Cryptographic protocols / Internet / Secure communication

draft-nottingham-http2-encryption-02 - Opportunistic Encryption for HTTP URIs

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
UPDATE