Secure communication

Results: 3134



#Item
211Internet protocols / Cryptographic protocols / Internet Standards / Secure communication / Network architecture / Border Gateway Protocol / Network address translation / Transport Layer Security / HTTPS / Internet protocol suite / Virtual private network

Communication Networks Spring 2016 Laurent Vanbever www.vanbever.eu

Add to Reading List

Source URL: comm-net.ethz.ch

Language: English - Date: 2016-05-22 14:43:12
212Cryptography / Computing / Security / E-commerce / Secure communication / Crime prevention / National security / DMARC / Public key certificate / Sunrise period / Medical privacy / Domain name

GENERAL CONTROLS SUPPORTING THE DOMAIN NAME REGISTRATION SERVICES SOC 3 Audit Report Independent Service Auditor’s Report on Controls Placed in Operation

Add to Reading List

Source URL: www.encirca.com

Language: English - Date: 2016-04-14 14:46:28
213Computer access control / Computer security / Security / Cryptography / Strong authentication / Authentication / Security token / EMV / Phishing / Identity theft / Password / Electronic authentication

EBF_019489 8th February 2016 EBA Discussion Paper on future Draft Regulatory Technical Standards on strong customer authentication and secure communication under the

Add to Reading List

Source URL: www.ebf-fbe.eu

Language: English - Date: 2016-02-10 08:34:16
214Computing / Cyberwarfare / Computer security / E-commerce / Deception / Computer network security / Secure communication / Internet security / Malvertising / Malware / Ransomware / SonicWall

Microsoft Word - Dell_Security Threat Report_Exec Summary_021816_4pm PT

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-04-25 15:10:36
215

Tresys TurretGate™: Secure Enterprise Messaging Router Technical Overview Tresys TurretGate is a secure enterprise messaging router that facilitates safe communication between networks of differing security levels. It

Add to Reading List

Source URL: www.tresys.com

Language: English - Date: 2014-07-23 16:59:18
    216Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: mitls.org

    Language: English
    217Taxation in the United States / Identity documents / Data security / Cybercrime / Secure communication / Internal Revenue Service / Form W-2 / Identity theft / Personally identifiable information / Phishing / Data breach / Payroll tax

    UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF NORTH CAROLINA DAVID LINNINS, KIM WOLFINGTON, And CAROL BLACKSTOCK on behalf of themselves and all others similarly

    Add to Reading List

    Source URL: www.carolinasclassaction.com

    Language: English - Date: 2016-05-19 09:56:05
    218Email / Secure communication / Opportunistic TLS / Transport Layer Security / Internet Standards / Post Office Protocol / Internet Message Access Protocol / SMTPS / Simple Mail Transfer Protocol

    Elenco parametri per la posta elettronica pop/imap e smtp e dns dei più diffusi provider Provider smtp

    Add to Reading List

    Source URL: www.sergioaletta.com

    Language: English - Date: 2015-02-16 08:58:13
    219Cryptography / Computing / Cryptographic protocols / Internet protocols / Secure communication / Computer networking / Named data networking / Public-key cryptography / Encryption / Key / Symmetric-key algorithm / IPsec

    A New Approach to Securing Audio Conference Tools Zhenkai Zhu Paolo Gasti Yanbin Lu

    Add to Reading List

    Source URL: irl.cs.ucla.edu

    Language: English - Date: 2011-11-01 01:23:50
    220Secure communication / Public-key cryptography / Elliptic curve cryptography / Cryptographic protocols / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / HTTPS / Elliptic curve DiffieHellman / Handshaking / RSA

    A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov

    Add to Reading List

    Source URL: securewww.esat.kuleuven.be

    Language: English
    UPDATE