Secure communication

Results: 3134



#Item
791Key management / Cryptographic protocols / Access control / Secure communication / Two-factor authentication / Password / Authentication / Transport Layer Security / Certificate authority / Cryptography / Security / Public-key cryptography

Usable Privacy and Security Introduction to Security January 26, 2006 Michael Reiter Notes By: Sasha Romanosky

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-01-26 22:28:13
792Internet / Network architecture / Internet standards / HTTP / HTTP Secure / Load balancing / Transport Layer Security / Application delivery controller / SSL acceleration / Cryptographic protocols / Secure communication / Computing

Recent  work  in  OpenBSD  relayd AsiaBSDCon  2013 Reyk  Flöter  () ライクフローター Agenda

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2013-04-02 16:02:24
793Computer-mediated communication / Personal information managers / Calendaring software / Microsoft Outlook / Microsoft Exchange Server / Email client / Microsoft Office / Fast And Secure Protocol / Outlook Express / Email / Computing / Software

DATA SHEET Aspera Add-in for Microsoft Outlook Global person-to-person high-speed file delivery using email AT A GLANCE

Add to Reading List

Source URL: asperasoft.com

Language: English - Date: 2014-03-10 19:50:37
794Computer security / Crime prevention / Electronic commerce / National security / Secure communication / Massachusetts Institute of Technology / Cyberwarfare / MIT Sloan School of Management / MIT Computer Science and Artificial Intelligence Laboratory / Security / Technology / Computer network security

SLOAN SCHOOL OF MANAGEMENT Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3 SPECIAL INTRODUCTORY OFFER FOR FOUNDING MEMBERS OF (IC)3: Join MIT-(IC)3 as a Founding Member and get the

Add to Reading List

Source URL: ic3.mit.edu

Language: English - Date: 2015-04-14 21:14:47
795Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Public-key cryptography / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Abstract

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
796Computer architecture / Cryptographic protocols / Secure communication / Windows / Form / HTTP Secure / Server / Computing / Windows Server / Software

Controlapp online help Hussein Shafie February 16, 2015 XMLmind Controlapp online help

Add to Reading List

Source URL: www.xmlmind.com

Language: English - Date: 2015-02-15 02:58:19
797Secure communication / Key management / Public-key cryptography / Electronic commerce / HTTP Secure / Transport Layer Security / Stunnel / SSL acceleration / Load balancing / Cryptography / Computing / Cryptographic protocols

Recent work in OpenBSD relayd SSL Interception and other Advancements Reyk Floeter () March 2013 Abstract

Add to Reading List

Source URL: openbsd.aise.re

Language: English - Date: 2013-04-02 16:02:24
798Computer network security / Computer security / Electronic commerce / Secure communication / Vulnerability / Human security / Information security / Security / National security / Crime prevention

..: :www. A c t i v i s t S e c u r i t y .or g ::. . A Practical Security Handbook for Activists and Campaigns (v

Add to Reading List

Source URL: www.tsroadmap.com

Language: English - Date: 2008-03-11 22:52:09
799Internet standards / Electronic commerce / Internet protocols / Transport Layer Security / Dynamic SSL / Cryptography / Public-key cryptography / Secure communication

CloudFlare tackles lost SSL key risk with Keyless SSL

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-03 12:51:26
800Representational state transfer / Software architecture / Key management / OAuth / Cryptographic software / Secure communication / Transport Layer Security / Data Protection API / Cloud standards / Computing / Internet protocols

RESTful SecurityW2SP Dan Forsberg Nokia Research Center & Helsinki University of Technology (HUT)

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:05
UPDATE