Secure communication

Results: 3134



#Item
261Crypto-anarchism / Internet privacy / Cryptography / Mixminion / Digital rights / Mix network / Secure communication / Anonymous remailer / Distributed data storage / Crowds / Anonymous P2P

Compulsion Resistant Anonymous Communications George Danezis and Jolyon Clulow University of Cambridge, Computer Laboratory, William Gates Building, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom.

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:54
262Internet privacy / Network performance / Dark web / Wireless networking / Telecommunications engineering / Tor / Routing / Anonymity / Proxy server / Crowds / Anonymous remailer / Secure communication

The Design and Implementation of the A3 Application-Aware Anonymity Platform Micah Sherra,∗, Harjot Gillb , Taher Aquil Saeedc,1 , Andrew Maod , William R. Marczake , Saravana Soundararajanf,1 , Wenchao Zhoua,1 , Boon

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2013-10-29 14:55:45
263Key management / Public key infrastructure / E-commerce / Transport Layer Security / Secure communication / CA/Browser Forum / Extended Validation Certificate / HTTPS / Public key certificate / Gmail / Certificate authority / Encryption

Browser Interfaces and Extended Validation SSL Cer tificates: An Empirical Study Robert Biddle, P.C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen Carleton University, Ottawa, ON, Canada

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2009-11-27 08:29:52
264Computing / Internet / Internet privacy / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / Network performance / Proxy server / HTTP cookie / Transport Layer Security / Email

REEF FAMILY OF COMPANIES WEBSITE PRIVACY POLICY Visitors to the Reef Family of Companies website are not required to provide any personal information. However, to use certain features on this site, you may be asked to pr

Add to Reading List

Source URL: reefogc.com

Language: English - Date: 2010-08-20 15:18:56
265Secure communication / Cryptographic software / Internet security / Tor / Internet protocols / The Tor Project /  Inc / Flash proxy / The Guardian Project / Firefox / HTTPS

Monthly Progress report for April 2012 The Tor Project, Inc. Contents 1 Research 1.1 Anonymous Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: archive.torproject.org

Language: English - Date: 2012-05-11 15:32:41
266Computing / Cryptography / Internet / Cryptographic protocols / Internet protocols / Cryptographic software / Secure communication / Transport Layer Security / OpenSSL / Comparison of TLS implementations / Cipher suite / WolfSSL

1 A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche∗ , Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , Cedric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , P

Add to Reading List

Source URL: smacktls.com

Language: English - Date: 2015-03-05 00:10:02
267Information privacy / Economy / E-commerce / Payment cards / Security / Computer security / Secure communication / Cryptography / Payment Card Industry Data Security Standard / Payment card industry / Data breach / PCI

Media Contacts Lindsay Goodspeed PCI Security Standards Council +Twitter @PCISSC

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-09-29 16:20:11
268Prevention / Computing / Safety / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Cyber-physical system / Dependability

DECSoS 2015: EWICS/ERCIM/ARTEMIS Dependable Cyber-Physical Systems and Systems-of-Systems Workshop Programme September 22, 2015 Delft, The Netherlands Tuesday, 22nd September 2015

Add to Reading List

Source URL: safecomp2015.tudelft.nl

Language: English - Date: 2015-09-14 10:24:23
269

Scaling Secure Group Communication Systems: Beyond Peer-to-Peer Yair Amir ∗ Cristina Nita-Rotaru ∗ Jonathan Stanton †

Add to Reading List

Source URL: homes.cerias.purdue.edu

Language: English - Date: 2003-10-28 11:56:25
    270Computing / Internet / Network architecture / Secure communication / Internet Standards / Computer network security / Internet protocols / Internet security / SoftEther VPN / Tor / Transport Layer Security / HTTPS

    Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2015-10-05 18:07:52
    UPDATE