Proxy servers

Results: 95



#Item
31Geolocation / Internet / Proxy servers / Geosocial networking / Location-based service / Tracking / Privacy / Vienna U-Bahn / Anonymity / Ethics / Internet privacy / Navigation

PRIVACY-PRESERVING COMMUNICATION PROTOCOLS FOR AUTHENTICATED LOCATION-BASED SERVICES IN MOBILE NETWORKS by Qin Zhang

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-12-14 00:21:23
32Web browsers / Software / Web server / Hypertext Transfer Protocol / Proxy server / World Wide Web / Computing / Web development

Obroni Computer Club – Networking and Web servers Joachim Breitner November 7,thIt ist time to leave the sixties and go to modern computer times, and look

Add to Reading List

Source URL: www.joachim-breitner.de

Language: English - Date: 2014-10-06 15:51:37
33Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Proxy server / HTTP Secure / Secure Shell / Cryptographic protocols / Computing / Secure communication

Performance Analysis of TLS Web Servers Cristian Coarfa, Peter Druschel and Dan S. Wallach Department of Computer Science Rice University Abstract TLS is the protocol of choice for securing today’s ecommerce and online

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:16:24
34Cryptographic software / Tor / Computing / Computer file / System software / Proxy servers / Internet privacy / Software

Version in use 18 Aug 08 lb Timescapes Anonymisation Guidelines These guidelines are intended to be used by all members of the Timescapes programme and all affiliates of that programme. They have been created from seve

Add to Reading List

Source URL: www.timescapes.leeds.ac.uk

Language: English - Date: 2014-04-04 12:21:53
35Cross-platform software / World Wide Web / Web development / Network performance / Apache HTTP Server / Nginx / Server Side Includes / Web server / Server / Software / Computing / Reverse proxy

Fast Web Servers Cover story Alternative servers and Apache techniques

Add to Reading List

Source URL: www.linux-magazine.com

Language: English
36Computer networking / Network performance / Internet privacy / Proxy server / Reverse proxy / Squid / HTTP / Hypertext Transfer Protocol / Representational state transfer / Computing / Internet / Network architecture

On Defining a Role for Demand−Driven Surrogate Origin Servers Mark Nottingham <> Akamai Technologies San Mateo, CA, USA or "Reverse Proxy" mode, where the device is configured to cache and forward traffi

Add to Reading List

Source URL: www.mnot.net

Language: English - Date: 2000-05-30 18:28:31
37Security / Cryptographic software / Software / Human rights / Tor / Electronic commerce / Privacy / Computer security / Password / Proxy servers / Ethics / Internet privacy

Mix Operator's Agreement

Add to Reading List

Source URL: anon.inf.tu-dresden.de

Language: English - Date: 2004-03-04 05:41:54
38Internet privacy / Internet ethics / Proxy servers / Software / Content-centric networking / Tor / Internet / Computing / Cache / Computer networking

Cache Privacy in Named-Data Networking Gergely Acs∗ ,# , Mauro Conti† ,#,+ , Paolo Gasti‡ ,# , Cesar Ghali§ , Gene Tsudik§ ∗ INRIA † University of Padua ‡ New York Institute of Technology § University of C

Add to Reading List

Source URL: camera.crysys.hit.bme.hu

Language: English - Date: 2013-04-10 09:15:50
39Scripting languages / Internet privacy / Proxy servers / Network protocols / HTTP / AS/400 Control Language / Session / Parameter / HTTP cookie / Computing / Software engineering / Computer programming

Ingenieurbüro David Fischer AG | A Company of the Apica Group http://www.proxy-sniffer.com Handling of "Dynamically-Exchanged Session Parameters" Version 5.0 English Edition

Add to Reading List

Source URL: www.apicasystem.com

Language: English - Date: 2015-03-05 07:25:57
40Computing / Software / System software / Proxy servers / Tor / File sharing networks / Network congestion / Throughput / Peer-to-peer / Internet privacy / Network performance / Cryptographic software

How Low Can You Go: Balancing Performance with Anonymity in Tor John Geddes1 , Rob Jansen2 , and Nicholas Hopper1 1 University of Minnesota, Minneapolis, MN

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2013-05-06 18:02:20
UPDATE