Proxy server

Results: 1769



#Item
61Computer networking / Internet privacy / Network performance / Proxy server / Transmission Control Protocol

Presentation Introduction Overview and first clues Protocol analysis Short security analysis

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
62Public-key cryptography / Cryptography / Notary / Financial cryptography / E-commerce / Blind signature / Digital signature / Zero-knowledge proof / Proof of knowledge / Anonymity / Proxy server / Authentication

Making a Nymbler Nymble using VERBS? Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,k2henry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2016-05-12 20:00:31
63Image compression / Internet protocols / JPIP / Proxy server / Hypertext Transfer Protocol / JPEG / Cache / Transmission Control Protocol

Improving the Remote Browsing of JPEG 2000 Images on the Web J.P. ORTIZ, V.G. RUIZ, I. GARCIA Computer Architecture and Electronics Department University of Almer´ıaAlmer´ıa, Spain email: .

Add to Reading List

Source URL: www.hpca.ual.es

Language: English - Date: 2013-01-29 11:20:47
64Internet privacy / Internet security / Internet protocols / Content-control software / Secure communication / Proxy server / Internet censorship / Deep packet inspection / Compagnies Rpublicaines de Scurit / Tor / Internet / HTTP 404

Proceedings on Privacy Enhancing Technologies ; ):37–61 Sheharbano Khattak*, Tariq Elahi*, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg SoK: Making Sense of Censorship Resistance Syst

Add to Reading List

Source URL: sec.cs.ucl.ac.uk

Language: English - Date: 2016-07-19 04:21:03
65Image compression / Graphics file formats / JPIP / JPEG / Web page / Proxy server / Push technology / ECW

An Efficient Technique for Remote Browsing of JPEG 2000 Images on the Web J.P. Ortiz, V.G. Ruiz and I. Garc´ıa Abstract— This paper presents an evaluation of the existing techniques for remote browsing of JPEG 2000 i

Add to Reading List

Source URL: www.hpca.ual.es

Language: English - Date: 2013-01-29 11:20:47
66Transport Layer Security / Computer network security / Internet privacy / Computer networking / Network performance / Proxy server / Certificate authority / World Wide Web / Password / Man-in-the-middle attack / Online banking

Internet Banking Some InternetAnalyzing DNS Incidents SSL and users

Add to Reading List

Source URL: www.rvs.uni-bielefeld.de

Language: English - Date: 2002-12-19 11:49:33
67Hypertext Transfer Protocol / World Wide Web / Internet protocols / Internet privacy / Computer networking / Proxy server / SPDY / HTTP/2 / Web cache / HTTP cookie / QUIC / Cache

Flywheel: Google’s Data Compression Proxy for the Mobile Web Victor Agababov∗ Michael Buettner Victor Chudnovsky Mark Cogan Ben Greenstein Shane McDaniel Michael Piatek Colin Scott† Matt Welsh Bolian Yin Google, In

Add to Reading List

Source URL: www.mdw.la

Language: English - Date: 2016-04-22 14:41:34
68Dark web / Secure communication / Internet privacy / File sharing / Cross-platform software / Tor / Onion routing / Anonymous remailer / I2P / Proxy server / Peer-to-peer / Crowds

How Much Anonymity does Network Latency Leak? Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin University of Minnesota 200 Union St SE Minneapolis, MNUSA

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
69Domain name system / Web Proxy Autodiscovery Protocol / Generic top-level domain / .local / Root name server / Domain name / Proxy auto-config / Name server / Top-level domain / OpenDNS / .global / DNS zone

MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil† , Matthew Thomas†, Z. Morley Mao University of Michigan, † Verisign Labs alfchen@umich.

Add to Reading List

Source URL: www.verisign.com

Language: English - Date: 2016-05-23 09:25:07
70Object-oriented programming languages / Object-oriented programming / Forwarding / Objective-C / Smalltalk / Self / Proxy / Delegation / Proxy server

Propagation of Behavioral Variations with Delegation Proxies (Preprint)? Camille Teruel1 , Erwann Wernli2 , Stéphane Ducasse1 , and Oscar Nierstrasz2 1

Add to Reading List

Source URL: rmod.inria.fr

Language: English - Date: 2015-11-03 10:16:25
UPDATE