Secure communication

Results: 3134



#Item
821Security / Android / Voice over IP / Secure voice / Secure telephone / Accellion /  Inc. / Secure communication / Computing / Technology

ASSURED MOBILE ENVIRONMENT SECURE MOBILITY ON COMMERCIAL DEVICES COMMUNICATE SECURELY ON THE GO

Add to Reading List

Source URL: www.motorolasolutions.com

Language: English - Date: 2015-03-19 15:35:12
822Internet standards / Internet protocols / FTP / Cryptographic protocols / Secure communication / Transport Layer Security / File Transfer Protocol / Comparison of FTP client software / HTTP Secure / Computing / Internet / Network architecture

Momentum Systems White Paper: Securing and Integrating File Transfers Over the Internet Securing and Integrating File Transfers Over the Internet

Add to Reading List

Source URL: www.momsys.com

Language: English - Date: 2012-03-26 15:32:48
823Computing / Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
824Secure communication / Key management / Public-key cryptography / Electronic commerce / HTTP Secure / Transport Layer Security / Stunnel / SSL acceleration / Load balancing / Cryptography / Computing / Cryptographic protocols

Recent work in OpenBSD relayd SSL Interception and other Advancements Reyk Floeter () March 2013 Abstract

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2013-04-02 16:02:24
825Electronic commerce / Secure communication / Internet privacy / FTP clients / NoScript / Cross-site scripting / HTTP cookie / Google Chrome / HTTP Strict Transport Security / Computing / Software / HTTP

The Need for a Coherent Web Security Policy Framework Jeff Hodges and Andy Steingruebl PayPal, Inc. {Jeff.Hodges,asteingruebl}@PayPal.com Abstract Web-based malware and attacks are proliferating

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:02
826Key management / HTTP / Secure communication / X.509 / Public key certificate / Internet Information Services / HTTP Secure / Form / Thawte / Cryptography / Public-key cryptography / Cryptographic protocols

Visual Intercept Tech Tip - How to Configure a Visual Intercept Web site as a Secure Site

Add to Reading List

Source URL: www.elsitech.com

Language: English - Date: 2014-01-31 12:54:24
827Wireless sensor network / Computer networking / Telecommunications engineering / IEEE 802 / Inter-process communication / NesC / Sensor node / Node / TinyOS / Computing / Wireless networking / Technology

SpartanRPC: Secure WSN Middleware for Cooperating Domains Peter Chapin The University of Vermont Burlington, Vermont Email:

Add to Reading List

Source URL: web.vtc.edu

Language: English - Date: 2013-05-09 09:08:56
828Computer network security / Secure communication / National security / Public safety / Data breach / Information governance / Information security / Security / Computer security / Data security

Checklist Guidance for Reporting, Managing and Investigating Information Governance Serious Incidents Requiring Investigation

Add to Reading List

Source URL: www.igt.hscic.gov.uk

Language: English - Date: 2015-02-27 09:10:22
829Computer security / Computer network security / Cyberwarfare / Data breach / Secure communication / Identity theft / Reputation / Internet privacy / Privacy / Security / Ethics / Data security

Information Privacy & Data Security Practice Group Law Alert A Corporate Department Publication Additional Reading Measuring the Loss of Brand and

Add to Reading List

Source URL: cmhinfragard.org

Language: English - Date: 2013-12-19 14:45:04
830Internet protocols / Computer network security / Information / TCP/IP / Secure communication / Tcpcrypt / Transmission Control Protocol / Secure Shell / Wireless security / Cryptographic protocols / Computing / Data

The case for ubiquitous transport-level encryption Andrea Bittau Stanford Michael Hamburg Stanford

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-06-02 14:19:01
UPDATE