Protocols

Results: 23793



#Item
261Computing / Internet / Cryptographic protocols / Secure communication / Network architecture / Hypertext Transfer Protocol / Internet security / HTTPS / Crimeware / Internet privacy / Transport Layer Security / Bolt

Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-19 14:01:38
262Computing / Directory services / Computer access control / Software / Computer security / Internet Standards / Internet protocols / Access control / Lightweight Directory Access Protocol / Authentication / Security Support Provider Interface / Password

PDF Document

Add to Reading List

Source URL: www.inforouter.com

Language: English - Date: 2015-03-26 12:13:27
263Electronic engineering / Digital electronics / Electronics / Electronic design automation / Electronic design / Logic in computer science / Cryptographic protocols / Garbled circuit / Boolean circuit / Sequential logic / Logic synthesis / Standard cell

2015 IEEE Symposium on Security and Privacy TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits Ebrahim M. Songhori∗ , Siam U. Hussain∗ , Ahmad-Reza Sadeghi† , Thomas Schneider† , Farinaz Kous

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:20
264Economy / Payment systems / Money / Financial services / E-commerce / Merchant services / Cryptographic protocols / Embedded systems / 3-D Secure / Credit card / Card security code / Authentication

Definition of Systempay Standard Web Services Version 2.6a Writing, Reviewing, Approval

Add to Reading List

Source URL: systempay.cyberpluspaiement.com

Language: English - Date: 2012-10-17 09:29:30
265Network architecture / Computing / Fiber-optic communications / Network protocols / Computer architecture / Routing / Automatically switched optical network / Synchronous optical networking / Bandwidth / Multiprotocol Label Switching / Shortest path problem

Improving Restoration Success in Mesh Optical Networks Fang Yu 1, Rakesh Sinha2, Dongmei Wang3, Guangzhi Li3, John Strand2, Robert Doverspike2, Charles Kalmanek 3, and Bruce Cortez 2 1 EECS Department, UC Berkeley, Berke

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 20:21:43
266Computing / Cryptography / Computer security / Internet protocols / Computer access control / Internet Standards / Code division multiple access / Computer network security / Diameter protocol / Authentication protocol / RADIUS / OAuth

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Add to Reading List

Source URL: ietf.org

Language: English - Date: 2014-03-02 06:27:58
267Domain name system / Computing / Internet / Network architecture / Internet protocols / Internet Standards / Name server / Domain name / Comparison of DNS server software / Google Public DNS

DIY DNS DFIR: You’re Doing it WRONG Andrew Hay, CISO DataGravity, Inc. twitter.com/andrewsmhay

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-04-15 13:43:26
268Computing / Internet / Internet protocols / Internet Standards / Internet privacy / Internet security / Computer networking / DNS spoofing / Hypertext Transfer Protocol / Domain Name System / Proxy server / SOCKS

HTTP - SECURITY http://www.tutorialspoint.com/http/http_security.htm Copyright © tutorialspoint.com HTTP is used for communications over the internet, so application developers, information

Add to Reading List

Source URL: www.tutorialspoint.com

Language: English - Date: 2015-09-30 15:33:47
269Computing / Internet protocols / Cryptography / Network architecture / Cryptographic protocols / Secure communication / Computer networking / QUIC / Network protocols / Datagram Transport Layer Security / Comparison of TLS implementations / Public-key cryptography

2015 IEEE Symposium on Security and Privacy How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:10
270Computing / Software / System software / System administration / Internet Standards / Internet protocols / Network management / Syslog / X86-64 / Filesystem Hierarchy Standard

PDF Document

Add to Reading List

Source URL: hm.hgesser.de

Language: English - Date: 2009-03-04 06:20:16
UPDATE