SPDY

Results: 49



#Item
11Computing / Internet / Cloudflare / Content delivery network / Internet security / SPDY / Go

CloudFlare reseller program Offer customers enhanced performance, security and availability, while increasing customer retention and generating new revenue. Protect and accelerate any website, API or web application. Ben

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2016-06-09 18:53:10
12Computing / Transport Layer Security / Data compression / Internet / Software / Cryptography / Internet protocols / CRIME / BREACH / Gzip / SPDY / Oracle attack

Angelo Prado Neal Harris Yoel Gluck SSL, GONE

Add to Reading List

Source URL: breachattack.com

Language: English - Date: 2013-08-05 21:32:24
13Computing / Cryptography / Internet / Internet protocols / Transport Layer Security / Cryptographic protocols / Internet security / Internet Standards / Cloudflare / SPDY / HTTP/2 / Online Certificate Status Protocol

HTTPS is Fast and Hassle-free with CloudFlareFLARE | | www.cloudflare.com In the past, organizations had to choose between performance

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2016-04-15 17:06:26
14Internet protocols / World Wide Web / Computer networking / QUIC / SPDY / HTTP/2 / Transmission Control Protocol / Hypertext Transfer Protocol / Packet loss / Round-trip delay time / Micro Transport Protocol

QUIC Quick UDP Internet Connections Multiplexed Stream Transport over UDP Presentation by

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2013-11-07 10:43:15
15Computing / Software / World Wide Web / Network architecture / Internet protocols / Hypertext Transfer Protocol / SPDY / Web development / HTTP/2 / Amazon Silk / Push technology / Internet Explorer 11

How Speedy is SPDY? Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, and David Wetherall, University of Washington https://www.usenix.org/conference/nsdi14/technical-sessions/wang This paper is included in

Add to Reading List

Source URL: www.usenix.org

Language: English
16

4G Americas The Impact of SPDY June 2014

Add to Reading List

Source URL: www.4gamericas.org

Language: English - Date: 2015-01-22 17:36:47
    17Wearable computers / Ubiquitous computing / Humancomputer interaction / Wearable devices / Personal digital assistants / Wearable technology / Smartglasses / Google Glass / Mobile computing / Android / SPDY / Mobile device

    Towards the Era of Wearable Computing? Jagmohan Chauhan Anirban Mahanti Mohamed Ali Kaafar

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2014-12-01 17:07:12
    18Internet protocols / Internet security / Internet Standards / Secure communication / World Wide Web / Transport Layer Security / Internet censorship circumvention / SPDY / Telex / Public-key cryptography / Censorship / Tor

    Censorship Resistance as a Side-Effect Henry Tan Georgetown University Washington, DC USA Micah Sherr

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2014-03-31 17:22:53
    19Computing / Network architecture / Internet / Simone / MX4J / SPDY

    HTTP/2 & Java Current Status Simone Bordet

    Add to Reading List

    Source URL: presentations2015.s3.amazonaws.com

    Language: English - Date: 2015-05-24 12:10:47
    20HTTP / Secure communication / Internet protocols / Key management / Public-key cryptography / HTTP Secure / HTTP Strict Transport Security / SPDY / Google Chrome / Computing / Software / Internet

    Why take HTTPS seriously? It is very easy to dismiss a correct implementation

    Add to Reading List

    Source URL: blog.squixa.com

    Language: English - Date: 2014-11-23 21:30:15
    UPDATE