Secure communication

Results: 3134



#Item
801Internet / Secure communication / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Secure Shell / Cipher suite / HTTP Secure / Cryptographic protocols / Computing / Network architecture

Opportunistic Encryption Everywhere Adam Langley Google Inc San Francisco, California

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
802Data / Internet standards / Internet / Secure communication / Cryptographic software / Kerberos / Cryptographic protocols / Internet protocols / Computing

KMIP C Client SDK Complete vendor-independent key management solution 01010101100100101101001101110010101011010101010 KEY MANAGEMENT

Add to Reading List

Source URL: www.cryptsoft.com

Language: English - Date: 2015-04-27 12:14:08
803Theoretical computer science / Quantum information science / Key management / Quantum key distribution / Secure Communication based on Quantum Cryptography / Key size / Photon / Quantum computer / Key / Cryptography / Quantum cryptography / Physics

IDQ White Paper - Understanding QKD

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
804Crime prevention / National security / Computer network security / Secure communication / Kernel / Vulnerability / Operating system / Ring / Application security / Computer security / Security / Cyberwarfare

Security and the Average Programmer (Invited Contribution) Daniel Giffin, Stefan Heule, Amit Levy, David Mazi`eres, John Mitchell, Alejandro Russo*, Amy Shen, Deian Stefan, David Terei, and Edward Yang Stanford and *Cha

Add to Reading List

Source URL: stefanheule.com

Language: English - Date: 2015-01-15 03:04:25
805Software / Web services / Service-oriented architecture / Windows Communication Foundation / Enterprise service bus / SOAP / JBoss Enterprise SOA Platform / WSO2 / Computing / Enterprise application integration / Information technology management

In today’s highly competitive global market, businesses operate in a very dynamic environment in which secure information transfer is the most important aspect of the business. Responding rapidly to changes in competit

Add to Reading List

Source URL: www.glovia.nl

Language: English
806Public key certificate / HTTP Secure / Cryptography / Computer security / Anonymity / Electronic commerce / Secure communication / Security

Michael Waidner () IBM Zurich Research Laboratory CH8803 Rüschlikon -- Schweiz Secure Electronic Marketplace for Europe

Add to Reading List

Source URL: www.semper.org

Language: English
807Computer security / Cryptographic protocols / Secure communication / Smartphones / HTTP Secure / Ransomware / Privilege escalation / Cipher / China Internet Network Information Center / Malware / Computing / Cyberwarfare

Security Now! #Q&A #210  This week on Security Now! ● ● ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-04-14 13:01:48
808National security / Computer network security / Electronic commerce / Secure communication / Multilevel security / Trusted computing base / Operating system / Kernel / Ring / Computer security / Security / Crime prevention

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
809Secure communication / Data / Information / Transport Layer Security / Cipher suite / HTTP Secure / STARTTLS / Server Name Indication / Extensible Messaging and Presence Protocol / Cryptographic protocols / Internet protocols / Computing

draft-ietf-uta-tls-bcp-11 - Recommendations for Secure Use of TLS and DTLS

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-02-23 04:04:03
810Secure communication / Data / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / Cipher suite / SSL acceleration / HTTP Secure / Cryptography / Cryptographic protocols / Computing

The Design and Implementation of Protocol-Based Hidden Key Recovery Eu-Jin Goh1 , Dan Boneh1 , Benny Pinkas2 , and Philippe Golle1 1 Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-07-21 17:54:06
UPDATE