Opportunistic encryption

Results: 30



#Item
1draft-ietf-httpbis-http2-encryption-08 - Opportunistic Security for HTTP

draft-ietf-httpbis-http2-encryption-08 - Opportunistic Security for HTTP

Add to Reading List

Source URL: tools.ietf.org

- Date: 2016-11-01 23:04:15
    2Intro  The Plan Implementation

    Intro The Plan Implementation

    Add to Reading List

    Source URL: www.g10code.de

    Language: English - Date: 2015-11-01 10:38:20
    3Uncovering Cryptographic Failures 
 with Internet-Wide Measurement Zakir Durumeric University of Michigan

    Uncovering Cryptographic Failures 
 with Internet-Wide Measurement Zakir Durumeric University of Michigan

    Add to Reading List

    Source URL: zakird.com

    Language: English
    4Neither Snow Nor Rain Nor MITMAn Empirical Analysis of Email Delivery Security Zakir Durumeric† David Adrian† Ariana Mirian† James Kasten† Elie Bursztein‡ Nicolas Lidzborski‡ Kurt Thomas‡ Vijay Erant

    Neither Snow Nor Rain Nor MITMAn Empirical Analysis of Email Delivery Security Zakir Durumeric† David Adrian† Ariana Mirian† James Kasten† Elie Bursztein‡ Nicolas Lidzborski‡ Kurt Thomas‡ Vijay Erant

    Add to Reading List

    Source URL: zakird.com

    Language: English
    5Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

    Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2006-04-27 10:23:08
    6strongSwan The new IKEv2 VPN Solution Andreas Steffen  Copyright © 2007 by Andreas Steffen

    strongSwan The new IKEv2 VPN Solution Andreas Steffen Copyright © 2007 by Andreas Steffen

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2007-05-26 10:12:50
    7Private Use of Untrusted Web Servers via Opportunistic Encryption

    Private Use of Untrusted Web Servers via Opportunistic Encryption

    Add to Reading List

    Source URL: w2spconf.com

    Language: English - Date: 2012-02-07 16:10:03
    8Intro  The Plan Implementation

    Intro The Plan Implementation

    Add to Reading List

    Source URL: www.g10code.com

    Language: English - Date: 2011-11-14 04:16:35
    9Openswan - IPsec on Linux for the Future 7. Juni 2004 Legal Notice Dieser Beitrag ist lizensiert unter der GNU General Public License. Zusammenfassung The world of IPsec on Linux is a confusing one at the moment. With Ke

    Openswan - IPsec on Linux for the Future 7. Juni 2004 Legal Notice Dieser Beitrag ist lizensiert unter der GNU General Public License. Zusammenfassung The world of IPsec on Linux is a confusing one at the moment. With Ke

    Add to Reading List

    Source URL: www.free-it.org

    Language: English - Date: 2005-03-10 13:07:07
    10GSM Association Official Document WWG.04 - Network Management of Encrypted Traffic Non-confidential  Network Management of Encrypted Traffic

    GSM Association Official Document WWG.04 - Network Management of Encrypted Traffic Non-confidential Network Management of Encrypted Traffic

    Add to Reading List

    Source URL: www.gsma.com

    Language: English - Date: 2015-03-10 07:01:32