First Page | Document Content | |
---|---|---|
![]() Date: 2014-02-07 14:41:45Tunneling protocols Cryptographic protocols Internet standards Man-in-the-middle attack Label Switched Path Opportunistic encryption Public-key cryptography IPsec Pseudo-wire Network architecture Computing Cryptography | Add to Reading List |
![]() | draft-ietf-httpbis-http2-encryption-08 - Opportunistic Security for HTTPDocID: 1trJm - View Document |
![]() | Intro The Plan ImplementationDocID: 1qIzt - View Document |
![]() | Uncovering Cryptographic Failures with Internet-Wide Measurement Zakir Durumeric University of MichiganDocID: 1mrzr - View Document |
![]() | Neither Snow Nor Rain Nor MITMAn Empirical Analysis of Email Delivery Security Zakir Durumeric† David Adrian† Ariana Mirian† James Kasten† Elie Bursztein‡ Nicolas Lidzborski‡ Kurt Thomas‡ Vijay ErantDocID: 1mpQi - View Document |
![]() | Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPNDocID: 1lwpj - View Document |