Secure communication

Results: 3134



#Item
541Security / Internet protocols / Internet standards / Secure communication / Man-in-the-middle attack / Public key fingerprint / Public-key cryptography / Authentication / Transport Layer Security / Cryptography / Cryptographic protocols / Computing

Talking To Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong Xerox Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CAbalfanz,smetters,stewa

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:13:47
542Security / Cross-platform software / Extensible Messaging and Presence Protocol / Computer security / Instant messaging / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / National Cyber Security Division / Computing / Online chat / Computer-mediated communication

CAPABILITY OVERVIEW Surevine specialise in real-time secure information sharing. We design, build and support secure, scalable collaboration environments for the National, Homeland and Cyber Security domain and organisat

Add to Reading List

Source URL: www.surevine.com

Language: English - Date: 2015-04-10 11:43:15
543Data types / Cryptographic protocols / Inter-process communication / Models of computation / Smalltalk / Lambda calculus / Variable / Alice and Bob / Secure multi-party computation / Computing / Software engineering / Computer programming

Capability-based Financial Instruments 1 Mark S. Miller , Chip Morningstar2, Bill Frantz2 1

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2008-03-14 04:27:53
544WebSocket / Tor / Secure communication / Proxy server / Internet censorship circumvention / Internet privacy / Computing / Internet

Evading Censorship with Browser-Based Proxies David Fifield1 , Nate Hardison1 , Jonathan Ellithorpe1 , Emily Stark2 , Dan Boneh1 , Roger Dingledine3 , and Phil Porras4 1 2

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2012-05-01 13:41:51
545Secure communication / Network architecture / Internet standards / Internet protocols / HTTP / Transport Layer Security / HTTP Secure / URI scheme / Opportunistic encryption / Internet / Computing / Cryptographic protocols

GSM Association Official Document WWG.04 - Network Management of Encrypted Traffic Non-confidential Network Management of Encrypted Traffic

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2015-03-10 07:01:32
546Computing / Cryptography / Secure communication / Computer network security / Internet protocols / Transport Layer Security / Basic access authentication / Authentication / HTTP Secure / Security / Cryptographic protocols / HTTP

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-12-11 10:20:06
547Electronic commerce / Internet privacy / Signcryption / Encryption / Cipher / Secure communication / National Security Agency / Key generation / Secure multi-party computation / Cryptography / Public-key cryptography / Cryptographic protocols

SECURITY INTELLIGENCE for BROADCAST: THREAT ANALYTICS Sumit Chakraborty Fellow, Indian Institute of Management Calcutta, BEE (Jadavpur University), India E-mail: , ; Phon

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 09:37:56
548Computer security / Crime prevention / Electronic commerce / Secure communication / Cyberspace / Cyberpunk / Public safety / Security / National security / Computer network security

Programs to Support Cybersecurity Education and Training Faculty: Salim Hariri and Youssif Al Nashif Graduate Student: Kowsik Krishnan http://askcypert.org/ SPONSORS:

Add to Reading List

Source URL: acl.ece.arizona.edu

Language: English - Date: 2014-01-18 16:51:10
549Secure communication / SMS / Text messaging / GSM / Universal Mobile Telecommunications System / Bluetooth / Secure voice / Crypto phone / Technology / Mobile technology / Software-defined radio

TSM T3 Secure GSM mobile terminal TSM T3 - TELSY Secure Mobile - is a flexible secure terminal designed to protect

Add to Reading List

Source URL: www.telsy.com

Language: English - Date: 2011-05-23 06:32:50
550Security / Secure communication / Data / HTTP Secure / Hypertext Transfer Protocol / Session / World Wide Web / Two-factor authentication / Cross-site request forgery / Computing / HTTP / Cryptographic protocols

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.3

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2014-05-11 17:31:12
UPDATE