Secure communication

Results: 3134



#Item
371Secure communication / Information / Data / Internet protocols / Electronic commerce / HTTP Secure / Electronic voting / JavaScript / X.509 / Cryptographic protocols / Public-key cryptography / Computing

The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election J. Alex Halderman1 and Vanessa Teague2? arXiv:1504.05646v2 [cs.CR] 5 Jun 2015

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-06-08 06:10:21
372HTTP / Secure communication / Cryptographic protocols / Electronic commerce / Portable software / HTTP Secure / HTTP Strict Transport Security / Transport Layer Security / Man-in-the-middle attack / Software / Computing / Cryptography

Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning Yaoqi Jia∗ , Yue Chen‡ , Xinshu Dong† , Prateek Saxena∗ , Jian Mao‡ , Zhenkai Liang∗ ∗ Department of Computer Science,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:31
373Computing / Protection Profile / Key management / Public-key cryptography / Common Criteria / Electronic signature / Evaluation Assurance Level / Public key certificate / Integrity / Computer security / Evaluation / Security

Protection profiles for secure signature creation device — Part 6: Extension for device with key import and trusted communication with signature creation application

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-02-14 05:40:12
374HTTP / HTTP Secure / Secure communication / Integrity / Plug-in / Technology / Computing / Cryptographic protocols / Software

GlassTube: A Lightweight Approach to Web Application Integrity Per A. Hallgren Daniel T. Mauritzson Andrei Sabelfeld Chalmers University of Technology, Gothenburg, Sweden

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:10
375Key management / Certificate authorities / Secure communication / DigiCert / Certificate signing request / HTTP Secure / Public key certificate / X.509 / Comparison of SSL certificates for web servers / Cryptography / Cryptographic protocols / Public-key cryptography

Double Feature Talk 1) Intro to SSL 2) Git Basics for Devs & Designers SSL

Add to Reading List

Source URL: calgary.wordcamp.org

Language: English - Date: 2015-05-24 02:19:31
376Documents / Technical communication / Secure Digital / Flash memory / Technology / Computing / Computer hardware / Components / Datasheet

PDF Document

Add to Reading List

Source URL: dl.linux-sunxi.org

Language: English - Date: 2014-08-22 04:53:30
377Health / Data privacy / Health informatics / Instant messaging / Internet Relay Chat / Internet culture / Health Insurance Portability and Accountability Act / Secure messaging / Text messaging / Online chat / Computer-mediated communication / Computing

Case Study El Rio Community Health Center Increases Operational Efficiency With Secure Messaging About The Company

Add to Reading List

Source URL: www.tigertext.com

Language: English - Date: 2013-10-10 10:42:09
378Electronic engineering / Session border controller / Polycom / H.323 / SIP connection / SIP Trunking / NAT traversal / Comparison of VoIP software / Session Initiation Protocol / Voice over IP / Videotelephony / Computer-mediated communication

EdgeProtect™ 7000 Series Secure, high-quality, real-time voice and video communications. Scalable, single-box solution for small, medium and large enterprise. Supports mobile users and provides demarcation point for IP

Add to Reading List

Source URL: uk.ucc.westcon.com

Language: English
379Electronic commerce / Computer network security / Data breach / Secure communication / Cyberwarfare / Credit card / EMV / Card security code / Malware / Computer security / Security / Data security

asflj#fjrf^slfmec%vnun 12409C4QMCNAS9LKF2E 2014’s Biggest

Add to Reading List

Source URL: cdn.cardconnect.com

Language: English - Date: 2015-03-20 11:37:54
380Safety / Computer network security / Prevention / Data security / Computer security / Secure communication / ISO/IEC 27001 / Occupational safety and health / Security / Crime prevention / National security

Security Policy Statement Unclassified 1. INTRODUCTION & SCOPE The objective of this document is to provide an overview of our current Security Procedures which are designed to protect all SBL’s employees, the whole of

Add to Reading List

Source URL: www.softbox.co.uk

Language: English - Date: 2013-07-05 10:34:47
UPDATE