Opportunistic encryption

Results: 30



#Item
21Computing / URI schemes / Network architecture / Internet standards / Internet protocols / Transport Layer Security / HTTP Secure / Opportunistic encryption / Uniform resource identifier / Cryptographic protocols / Internet / Secure communication

draft-nottingham-http2-encryption-02 - Opportunistic Encryption for HTTP URIs

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
22Cryptographic protocols / Security / Computer network security / Secure communication / Cryptographic software / Opportunistic encryption / Tcpcrypt / HTTP Secure / Linked data / Computing / Internet privacy / Internet

Taken from: https://strint.pads.ccc.de/1 (backup at http://kuix.de:9321/p/strint-abstracts ) (updated Feb 27, 16:50 GMT) ============================== 1: Privacy Protected Email Phillip Hallam-Baker https://www.w3.org/2

Add to Reading List

Source URL: kuix.de

Language: English - Date: 2014-02-27 11:57:47
23Security / Secure communication / Computer network security / Internet protocols / HTTP / HTTP Secure / Authentication / Opportunistic encryption / Transport Layer Security / Cryptographic protocols / Cryptography / Computing

Trust  Issues  with  Opportunistic  Encryption   Scott  Rose,  Stephen  Nightingale,  Doug  Montgomery   {scottr,  night,  [removed]}   National  Institute  of  Sta

Add to Reading List

Source URL: www.had-pilot.com

Language: English - Date: 2014-03-21 15:07:13
24Open standards / Cryptographic software / Cross-platform software / Extensible Messaging and Presence Protocol / Online chat / Encryption / Privacy / Opportunistic encryption / Distributed social network / Computing / Internet privacy / Ethics

A few thesis regarding privacy and security Subject: A few thesis regarding privacy and security From: "Andreas Kuckartz" Date: 01/20/2014 10:46 PM To: group-strint-submission@w3.org

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
25Computing / ZRTP / Cipher suite / IPsec / Secure Shell / HTTP Secure / Cryptography / Opportunistic encryption / Secure Real-time Transport Protocol / Cryptographic protocols / Data / Information

          Is  Opportunistic  Encryption  the  Answer?  

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
26Opportunistic encryption / Internet Key Exchange / Perfect forward secrecy / Key-agreement protocol / Security association / ZRTP / X.509 / Public-key cryptography / Domain Name System Security Extensions / Cryptography / Cryptographic protocols / IPsec

Opportunistic Keying as a Countermeasure to Pervasive Monitoring Stephen Kent BBN Technologies Abstract This document was prepared as part of the IETF response to concerns about “pervasive monitoring” (PM) [Farrell-p

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
27Data / IPsec / Internet Key Exchange / Kerberos / Internet security / Secure Shell / Transport Layer Security / Internet Security Association and Key Management Protocol / Opportunistic encryption / Cryptographic protocols / Cryptography / Computing

Cryptography in OpenBSD: An Overview Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos fderaadt,niklas,art,angelos,[removed]

Add to Reading List

Source URL: openbsd.org

Language: English - Date: 2004-09-07 00:35:13
28Cryptography / Internet Key Exchange / StrongSwan / IPsec / Opportunistic encryption / NAT traversal / NAT-T / Virtual private network / Openswan / Cryptographic protocols / Computing / Data

strongSwan The new IKEv2 VPN Solution

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2007-05-26 10:12:50
29Data / Virtual private networks / Internet protocols / Computer network security / Internet privacy / StrongSwan / IPsec / Internet Key Exchange / Opportunistic encryption / Cryptographic protocols / Computing / Network architecture

Advanced Features of Linux strongSwan the OpenSource VPN Solution

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2006-04-27 10:23:08
30Data / IPsec / Internet Key Exchange / Kerberos / Internet security / Secure Shell / Transport Layer Security / Internet Security Association and Key Management Protocol / Opportunistic encryption / Cryptographic protocols / Cryptography / Computing

PDF Document

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2004-09-07 00:35:13
UPDATE