Internet layer

Results: 1652



#Item
521Cryptography / Data / Computing / Internet standards / Cipher suite / Transport Layer Security / TLS-PSK / Public-key cryptography / HTTP Secure / Cryptographic protocols / Internet protocols / Secure communication

1 DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose Luis

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 07:49:31
522Data / Information / Secure communication / Internet standards / Electronic commerce / Transport Layer Security / Authentication protocol / Cipher suite / Password authentication protocol / Cryptographic protocols / Cryptography / Internet protocols

Generic Compilers for Authenticated Key Exchange∗ Tibor Jager Florian Kohlar Sven Sch¨age

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-02 08:15:58
523Computing / Technology / Networking hardware / Cables / IEEE standards / Coaxial cable / Networking cables / Home network / Ethernet physical layer / Ethernet / Signal cables / OSI protocols

BiPACEoC End-Point Unit Extends a high-speed Internet connection through existing CATV network EoC End-Point Unit is designed to deliver a faster and more reliable stream of

Add to Reading List

Source URL: www.billion.com

Language: English - Date: 2011-02-25 05:24:27
524Freeware / Web browser / Tab / Opera Software / Windows Vista / Internet Explorer shell / Software / Internet Explorer / Deepnet Explorer

The Skin of Deepnet Explorer The UI of Deepnet Explorer (DE) consists of two layers. The first layer is provided by the Framework, and the second layer is provided by the Applet that is contained within the Framework. Cu

Add to Reading List

Source URL: www.deepnetexplorer.com

Language: English - Date: 2005-10-11 08:11:45
525Data / Secure communication / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / WS-Security / WS-SecureConversation / Cipher suite / Cryptography / Computing / Cryptographic protocols

Appears in C. Pautasso, T. Gschwind (Eds.): 2nd ECOWS Workshop on Emerging Web Services Technology – WEWST 2007, CEUR Workshop Proceedings (CEUR-WS.org) Vol-313, ISSN, 2008. SSL-over-SOAP: Towards a Token-bas

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-01-13 08:10:17
526Internet privacy / Cryptographic protocols / Communications protocol / Data transmission / Protocols / Public-key cryptography / Proxy server / Anonymity / Application layer / Cryptography / Computing / Data

Microsoft Word - anonim_10

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-16 11:44:00
527Network architecture / Internet / Internet standards / Electronic commerce / Transport Layer Security / HTTP Secure / Load balancing / Windows / HOB GmbH & Co KG / Computing / Cryptographic protocols / Secure communication

HOB GmbH & Co. KG SchwadermühlstrCadolzburg Tel: Fax: E-Mail:

Add to Reading List

Source URL: www.hobsoft.com

Language: English - Date: 2010-03-30 08:42:59
528Internet standards / Internet Protocol / New media / Scientific revolution / Communications protocol / Peer-to-peer / Link layer / Network address translation / Computer network / Computing / Network architecture / Internet

Olaf Kolkman Seoul,16 June 2008 Internet Technical Community Forum The Hourglass:

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:52
529Ethernet / Data link layer / Computing / Internet / Interxion / UPC Cablecom

USER CASE REDEFINING SECURITY Hyposwiss Private Bank Flexible Scalable Encryption for DataCenter Links Point-to-Point Gigabit Encryption

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
530Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Man-in-the-middle attack / Public-key cryptography / Password / Cryptography / Secure communication / Cryptographic protocols

Thou Shalt not Leak your Keys: Practical Key Privilege Separation Using Caml Crush M. DAUBIGNARD

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-01 08:17:00
UPDATE