Secure communication

Results: 3134



#Item
241Internet privacy / Dark web / Secure communication / Internet security / Tor / Onion routing / Anonymous remailer / I2P / Proxy server / Privacy / HTTPS / Internet censorship circumvention

PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks ∗ Tariq Elahi

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English
242Public key infrastructure / Public-key cryptography / Secure communication / Email encryption / Authentication / Transport Layer Security / Dynamic SSL

My Locker, Your Locker, Our Locker – How to Manage Keys and Certificates Pankaj Kumar Session Objectives

Add to Reading List

Source URL: pankaj-k.net

Language: English - Date: 2007-02-02 01:42:32
243Internet security / Internet privacy / Dark web / Secure communication / Tor / IP address / Proxy server / Port scanner / Hosts / The Tor Project /  Inc / Internet censorship

Do You See What I See? Differential Treatment of Anonymous Users Sheharbano Khattak? , David Fifield† , Sadia Afroz† , Mobin Javed† Srikanth Sundaresan‡ , Vern Paxson‡† , Steven J. Murdoch- , Damon McCoy‡ o

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-12-23 15:58:33
244Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2016-01-06 07:34:05
245

SSL Server Rating Guide version 2009k (14 OctoberCopyright © Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication. We feel

Add to Reading List

Source URL: dev.ssllabs.com

Language: English - Date: 2016-04-12 09:51:38
    246Computer security / Security / Cyberwarfare / Computer network security / Cryptography / Secure communication / Advanced persistent threat / Threat / Malware / SentinelOne / Damballa

    Data Sheet What Makes Us Different Single pane of glass threat visibility and correlation

    Add to Reading List

    Source URL: go.cyphort.com

    Language: English - Date: 2016-04-14 11:33:50
    247Dark web / Internet security / Secure communication / Tor / Email / Guard / Internet Relay Chat / Proxy server

    Proceedings on Privacy Enhancing TechnologiesJamie Hayes and George Danezis Guard Sets for Onion Routing Abstract: “Entry” guards protect the Tor onion routing system from variants of the “predecessor” att

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2015-05-15 18:39:35
    248Internet / Computing / Network architecture / Internet security / Secure communication / Content delivery network / Tor / Dark web / Cloudflare / CAPTCHA / The Tor Project /  Inc / Facebookcorewwwi.onion

    Fact Sheet: Cloud Flare and the Tor Project What is the Tor Project? The Tor Project (TorProject.org) is a non-profit organization that develops and distributes free software to help millions of people defend against onl

    Add to Reading List

    Source URL: people.torproject.org

    Language: English - Date: 2016-03-31 13:39:58
    249Cryptography / Computing / Secure communication / Cryptographic protocols / Internet protocols / E-commerce / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / RSA / HTTPS

    On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager Jörg Schwenk

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2015-08-21 05:45:15
    250Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Transport Layer Security / Hypertext Transfer Protocol / Internet Standards / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

    1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

    Add to Reading List

    Source URL: www.mitls.org

    Language: English - Date: 2014-02-27 10:40:02
    UPDATE