HTTP Strict Transport Security

Results: 30



#Item
1

Bypassing HTTP Strict Transport Security Jose Selvi Abstract—For the last few years, some different attacks against SSL/TLS have been released. Some of them based on cryptography or protocol weaknes

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:50:56
    2Clean Water Act / Environment / Water law in the United States / Environmental health officer / HTTP Strict Transport Security / Natural environment / Health / Computing

    HSTS and Small-Flow STS Permitting Process 1. Owner or owner designee must first make application with the Health Department and submit a fee. The application is called Application for Site Review. The application will i

    Add to Reading List

    Source URL: wayne-health.org

    Language: English - Date: 2016-02-19 10:43:36
    3Visual arts / Comic strips / Needlework / Publishing / Triangle geometry / Sewing / Quilting / Comic strip formats / Triangle / Seam / Hem / HTTP Strict Transport Security

    Dance Steps A free 56" x 32" table runner pattern from Quiltbug.com Fabric Requirements 3/4 yard red •

    Add to Reading List

    Source URL: quiltbug.com

    Language: English - Date: 2011-03-15 09:00:56
    4Cryptography / Computing / Computer security / HTTP Strict Transport Security / Password / PBKDF2 / Bcrypt / Scrypt / JavaScript / Salt

    Developing with Catalyst as securely as possible What do I need to do? ● Catalyst generally tries to help you be secure and most of the plugins are pretty

    Add to Reading List

    Source URL: birmingham.pm.org

    Language: English - Date: 2014-12-04 13:54:55
    5Cryptography / Computing / Software / Hypertext Transfer Protocol / Transport Layer Security / Secure communication / Cryptographic protocols / HTTP Strict Transport Security / HTTP Public Key Pinning / HTTP cookie / HTTPS / Browser security

    Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning Michael Kranch Joseph Bonneau

    Add to Reading List

    Source URL: www.internetsociety.org

    Language: English - Date: 2015-07-30 05:47:43
    6Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: mitls.org

    Language: English
    7Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Transport Layer Security / Hypertext Transfer Protocol / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2014-02-27 10:40:02
    8Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / Cipher suite

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2014-02-27 10:40:02
    9Secure communication / Internet protocols / Cryptographic protocols / Transport Layer Security / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK / TLS-SRP / GnuTLS / Cipher suite

    PDF Document

    Add to Reading List

    Source URL: bh.ht.vc

    Language: English - Date: 2014-07-18 09:42:13
    10HTTP / Secure communication / Cryptographic protocols / Electronic commerce / Portable software / HTTP Secure / HTTP Strict Transport Security / Transport Layer Security / Man-in-the-middle attack / Software / Computing / Cryptography

    Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning Yaoqi Jia∗ , Yue Chen‡ , Xinshu Dong† , Prateek Saxena∗ , Jian Mao‡ , Zhenkai Liang∗ ∗ Department of Computer Science,

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:31
    UPDATE