Messaging Security

Results: 466



#Item
451Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-05-03 16:10:02
452Spam filtering / Computer network security / Email / Messaging Security / Anti-spam techniques / Email spam / Spam / The Spamhaus Project / Security appliance / Computing / Spamming / Internet

Check Point Messaging Security FAQ Messaging Security Overview Q: What is “Messaging Security?”

Add to Reading List

Source URL: www.checkpoint.com

Language: English - Date: 2008-08-15 16:43:08
453Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: www.stanford.edu

Language: English - Date: 2006-03-21 17:10:20
454Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging

Finite-State Security Analysis of OTR Version 2 Joseph Bonneau

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2006-03-21 17:10:20
455Agencies of the European Union / Law enforcement in Europe / Terrorism / Counter-terrorism / Terrorist Finance Tracking Program / Telecommunications data retention / Eurojust / Europol / United States Department of the Treasury / Government / National security / Security

AGREEMENT BETWEEN THE EUROPEAN UNION AND THE UNITED STATES OF AMERICA ON THE PROCESSING AND TRANSFER OF FINANCIAL MESSAGING DATA FROM THE EUROPEAN UNION TO THE UNITED STATES FOR PURPOSES OF THE TERRORIST FINANCE TRACKING PROGRAM

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2010-06-11 06:33:17
456Android software / Instant messaging clients / Online chat / Communication software / WhatsApp / SMS / Text messaging / Extensible Messaging and Presence Protocol / Skype / Software / Computing / Cross-platform software

Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Fr¨uhwirt, Peter Kieseberg, Manuel Leithner,

Add to Reading List

Source URL: www.sba-research.org

Language: English - Date: 2012-10-03 11:37:53
457World Wide Web / Real-time web / Social media / Text messaging / Twitter / Internet privacy / Computing / Public key certificate / Certificate authority / Public-key cryptography / Key management / Technology

Twitter in Disaster Mode: Security Architecture Theus Hossmann, Paolo Carta, Dominik

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-12-04 10:33:22
458Cyberwarfare / Firewall / Deep packet inspection / Network security / DMZ / Messaging Security / Unified threat management / Application firewall / Distributed firewall / Computer network security / Computing / Computer security

PDF Document

Add to Reading List

Source URL: img1.custompublish.com

Language: English - Date: 2013-10-10 18:00:00
459WS-ReliableMessaging / Web services / Reliable messaging / Web Services Description Language / SOAP / WS-Security / Communications protocol / Transmission Control Protocol / WS-Addressing / Computing / Web standards / Data

PDF Document

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2003-03-14 08:21:46
460National security / Military communications / Law enforcement in the United Kingdom / Kent Police / Text messaging / Hong Kong Police Force / Police / Telecommunication / Home Office radio / Channel Tunnel / Transport / Kent

PDF Document

Add to Reading List

Source URL: www.prolingua.co.uk

Language: English - Date: 2002-04-19 11:46:18
UPDATE