Secure communication

Results: 3134



#Item
291Secure communication / Cryptographic protocols / Internet Standards / Computer network security / Transport Layer Security / HTTPS / OpenSSL / Cipher suite / Handshaking / End-to-end encryption / Middlebox / Extensible Authentication Protocol

Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-07-29 16:55:02
292Content-control software / Internet security / Secure communication / Internet censorship / Privacy / Censorship / Tor / GFW

Measuring and circumventing Internet censorship Philipp Winter Karlstad University Department of Mathematics

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-11-12 13:28:27
293Internet Standards / Internet protocols / Internet security / Secure communication / Dark web / Tor / Transmission Control Protocol / Internet privacy / Internet Relay Chat / Padding

Google Summer of Code Proposal: A Framework for Website Fingerprinting Countermeasures   Marc Juarez Miro ()

Add to Reading List

Source URL: securehomes.esat.kuleuven.be

Language: English - Date: 2014-04-22 05:29:47
294

Underappreciated Security Mechanisms Peter Gutmann University of Auckland Introduction Standards for secure email and network communication

Add to Reading List

Source URL: www.cs.auckland.ac.nz

Language: English - Date: 2004-10-25 12:30:58
    295Internet security / Internet Standards / Internet protocols / Secure communication / Dark web / IP hijacking / Tor / Border Gateway Protocol / Traffic analysis / Denial-of-service attack / Transmission Control Protocol

    RAPTOR: Routing Attacks on Privacy in Tor arXiv:1503.03940v1 [cs.NI] 13 Mar 2015 Yixin Sun Princeton University

    Add to Reading List

    Source URL: vanbever.eu

    Language: English - Date: 2015-03-17 04:19:13
    296

    A Smart Card Mediated Mobile Platform for Secure E-Mail Communication Geylani Kardas Ege University International Computer Institute, 35100, Bornova, Izmir, TURKEY Abstract

    Add to Reading List

    Source URL: nsl.cse.unt.edu

    Language: English - Date: 2010-01-09 15:50:30
      297Secure communication / Firefox add-ons / News aggregators / Tor / Firefox / NoScript / HTTPS Everywhere / Libevent

      From: Andrew Lewman, Executive Director To: the tor community Date: July 12, 2011 This report documents progress in June 2011.

      Add to Reading List

      Source URL: archive.torproject.org

      Language: English - Date: 2011-09-15 09:57:05
      298

      Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes Yvo Desmedt1,2 Stelios Erotokritou1

      Add to Reading List

      Source URL: 2010.africacrypt.com

      Language: English - Date: 2010-05-27 06:39:52
        299

        Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience AFRICACRYPT 2010 Arpita Patra (IIT Madras)

        Add to Reading List

        Source URL: 2010.africacrypt.com

        Language: English - Date: 2010-05-10 18:14:54
          300Secure communication / Data security / Computer security / Crime prevention / National security / Data breach / Data loss prevention software / Identity theft / Laptop theft / Security / Cloud computing / Insider threat

          Report Grand Theft Data Data exfiltration study: Actors, tactics, and detection

          Add to Reading List

          Source URL: www.mcafee.com

          Language: English - Date: 2015-09-22 16:22:57
          UPDATE