Opportunistic encryption

Results: 30



#Item
11Internet / Secure communication / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Secure Shell / Cipher suite / HTTP Secure / Cryptographic protocols / Computing / Network architecture

Opportunistic Encryption Everywhere Adam Langley Google Inc San Francisco, California

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
12Data / Computer network security / TCP/IP / Tcpcrypt / Internet protocols / Tunneling protocols / Transmission Control Protocol / Opportunistic encryption / IPsec / Cryptographic protocols / Computing / Network architecture

tcpcrypt: the case for transport-level encryption Andrea Bittau, Dan Boneh, Mike Hamburg, Mark Handley, David Mazières, Quinn Slack Stanford, UCL

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2014-03-03 03:26:31
13Cryptographic protocols / Internet protocols / Internet privacy / Secure communication / Internet standards / Opportunistic encryption / Science and Technology Options Assessment / Transport Layer Security / HTTP Secure / Internet / Network architecture / Computing

Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-02-12 15:10:02
14Internet privacy / Cryptographic protocols / Internet protocols / Secure communication / Internet standards / Opportunistic encryption / Science and Technology Options Assessment / Transport Layer Security / Virtual private network / Internet / Computing / Cryptography

Science and Technology Options Assessment (STOA) Mass Surveillance Part 2 – Technology foresight, options for longer term security

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-01-09 09:28:01
15Data / Internet privacy / Internet / Computer network security / TCP/IP / Opportunistic encryption / Tcpcrypt / Authenticated encryption / Password / Cryptographic protocols / Cryptography / Computing

“Opportunistic” Encryption Strengthening the Internet Against Pervasive Monitoring (STRINT) !1

Add to Reading List

Source URL: down.dsg.cs.tcd.ie

Language: English - Date: 2014-03-01 03:17:05
16Public-key cryptography / Secure communication / Cryptographic software / Extensible Messaging and Presence Protocol / HTTP Secure / Opportunistic encryption / X.509 / Transport Layer Security / Simple Mail Transfer Protocol / Cryptography / Computing / Cryptographic protocols

File: /tmp/hosts-2.txt IS IT TIME TO BRING BACK THE HOSTS FILE? INELEGANT ENCRYPTION SOLUTIONS FOR AN INELEGANT NETWORK? Peter Eckersley, Technology Projects Director Electronic Frontier Foundation

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
17Tunneling protocols / Cryptographic protocols / Internet standards / Man-in-the-middle attack / Label Switched Path / Opportunistic encryption / Public-key cryptography / IPsec / Pseudo-wire / Network architecture / Computing / Cryptography

draft-farrelll-mpls-opportunistic-encrypt-00 - Opportunistic Encryption in MPLS Networks

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
18Computing / Internet protocols / Secure communication / Internet standards / Password / TLS-SRP / Man-in-the-middle attack / Public-key cryptography / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / Security

Replacing passwords on the Internet AKA post-Snowden Opportunistic Encryption Ben Laurie Google, Inc. Ian Goldberg

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
19Data / Secure communication / Internet protocols / Computer network security / HTTP / HTTP Secure / Opportunistic encryption / Transport Layer Security / Cryptographic protocols / Computing / Cryptography

Trust  Issues  with  Opportunistic  Encryption   Scott  Rose,  Stephen  Nightingale,  Doug  Montgomery   {scottr,  night,  [removed]}   National  Institute  of  Sta

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
20Computer network security / Internet / Internet protocols / TCP/IP / Tcpcrypt / Internet standards / Transport Layer Security / Wireless security / IPsec / Cryptographic protocols / Computing / Data

Simple Opportunistic Encryption Andrea Bittau Michael Hamburg Mark Handley David Mazi`eres Dan Boneh

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
UPDATE