IPsec

Results: 686



#Item
491Computing / ZRTP / Cipher suite / IPsec / Secure Shell / HTTP Secure / Cryptography / Opportunistic encryption / Secure Real-time Transport Protocol / Cryptographic protocols / Data / Information

          Is  Opportunistic  Encryption  the  Answer?  

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
492Opportunistic encryption / Internet Key Exchange / Perfect forward secrecy / Key-agreement protocol / Security association / ZRTP / X.509 / Public-key cryptography / Domain Name System Security Extensions / Cryptography / Cryptographic protocols / IPsec

Opportunistic Keying as a Countermeasure to Pervasive Monitoring Stephen Kent BBN Technologies Abstract This document was prepared as part of the IETF response to concerns about “pervasive monitoring” (PM) [Farrell-p

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
493FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / IPsec / Hardware random number generator / SHA-2 / FIPS 140-3 / Cryptographic Module Testing Laboratory / Cryptography / Cryptography standards / FIPS 140-2

FIPS[removed]Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-24 09:18:16
494IPsec / Secure Shell / Internet Security Association and Key Management Protocol / Key-agreement protocol / Public-key cryptography / Diffie–Hellman key exchange / Transport Layer Security / Whitfield Diffie / FIPS 140 / Cryptographic protocols / Cryptography / Internet Key Exchange

Microsoft Word - ASA-SM Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-17 10:33:44
495Berkeley Software Distribution / IPsec / AES instruction set / NetBSD / Computing / Computer architecture / FreeBSD

FreeBSD Foundation September Update The chill in the air reminds me that Fall is upon us and with that new season comes new opportunities and milestones for the Foundation. From upcoming conferences and a new book releas

Add to Reading List

Source URL: www.freebsdfoundation.org

Language: English - Date: 2014-09-23 11:49:08
496Information / Internet protocols / Secure communication / Electronic commerce / Block cipher modes of operation / Transport Layer Security / Padding / Initialization vector / IPsec / Cryptography / Cryptographic protocols / Data

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-12 12:47:41
497Computer security / Firewall / McAfee / Network security / Stateful firewall / IPsec / Network address translation / IPv6 / Deep packet inspection / Computer network security / Computing / Network architecture

Data Sheet McAfee Next Generation Firewall Key Benefits

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-07 15:07:32
498FreeBSD / Firewall / Secure Shell / Port / Berkeley Software Distribution / Filesystem permissions / IPsec / Unix / Computing / Internet protocols / Computer network security

Contents List of Figures vi

Add to Reading List

Source URL: www.reedmedia.net

Language: English - Date: 2007-12-31 10:27:27
499Cyberwarfare / Virtual private network / Check Point VPN-1 / Extranet / IPsec / Cisco PIX / Cisco IOS / Cisco Systems / VoIP VPN / Computer network security / Computing / Computer architecture

XML ASDI Via ED8: VPN End-User

Add to Reading List

Source URL: www.fly.faa.gov

Language: English - Date: 2009-05-14 11:36:22
500Daylight saving time / SRC

Implementation and Modification for CPE Routers: Filter Rule scan Optimization, IPsec Interface and Ethernet switch Masanobu SAITOH Hiroki Suenaga

Add to Reading List

Source URL: www.netbsd.org

Language: English - Date: 2014-03-27 05:30:02
UPDATE