Secure communication

Results: 3134



#Item
281Tor / Internet Standards / Internet protocols / Dark web / Secure communication / Internet privacy / Privacy / .onion / The Tor Project /  Inc / Tor Mail

Hidden-service statistics reported by relays David Goulet The Tor Project Aaron Johnson

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2015-08-09 15:01:51
282Internet protocols / Internet Standards / Internet security / Secure communication / Network performance / Transmission Control Protocol / Transport layer / Internet protocol suite / Out-of-order delivery / Tor / Stream Control Transmission Protocol / Hypertext Transfer Protocol

Reducing Latency in Tor Circuits with Unordered Delivery Michael F. Nowlan, David Wolinsky, and Bryan Ford Yale University Abstract Tor, the popular anonymous relay tool, incurs significant latency costs—partly due to

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-07-21 06:56:10
283Computing / Software / Internet / Internet security / Dark web / Secure communication / Tor / The Tor Project /  Inc / Linux kernel / Vidalia

From: Andrew Lewman, Executive Director To: the tor community Date: June 8, 2011 This report documents progress in May 2011.

Add to Reading List

Source URL: archive.torproject.org

Language: English - Date: 2011-09-15 09:57:06
284Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size / Safe prime

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-10-15 14:53:20
285Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / Cipher suite

1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2014-02-27 10:40:02
286Computing / Internet / Internet privacy / Internet security / Internet protocols / Secure communication / Content-control software / Tor / Internet censorship in China / Proxy server / Internet censorship circumvention / SOCKS

How the Great Firewall of China is Blocking Tor Philipp Winter and Stefan Lindskog Karlstad University {philwint, steflind}@kau.se Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English
287Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: www.vanbever.eu

Language: English - Date: 2014-10-08 09:38:20
288Cryptography / Secure multi-party computation / Secure two-party computation / Communication complexity / Commitment scheme / Oblivious transfer / Cryptographic protocol / XTR / Transmission Control Protocol

Covert Two-Party Computation Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PANicholas Hopper

Add to Reading List

Source URL: hunch.net

Language: English - Date: 2005-03-01 11:04:04
289Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Bachelor of Science in Information Technology / University of Limerick / Electrical engineering / Pulchok Campus / UP Diliman Electrical and Electronics Engineering Institute

Technical image with pc board connected to testing wires. laptop, drawings and multimeter in scene.

Add to Reading List

Source URL: www.ece.ul.ie

Language: English - Date: 2015-04-20 11:48:45
290Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt / Transport Layer Security / Application security / OWASP

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
UPDATE