Secure communication

Results: 3134



#Item
81Computing / Software / Free software / Dark web / Secure communication / Cryptographic software / Tor / I2P / Onion routing / HTTPS / Mixminion / Internet Relay Chat

Revisiting Circuit Clogging Attacks on Tor Eric Chan-Tin, Jiyoung Shin and Jiangmin Yu Department of Computer Science Oklahoma State University {chantin, jiyoung, jiangmy}@cs.okstate.edu Abstract—Tor is a popular anony

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2013-11-08 14:52:20
82Computing / Network architecture / Internet / Network protocols / Internet Standards / Internet protocols / Cryptographic protocols / Secure communication / Transport Layer Security / Transmission Control Protocol / Clientserver model / Session

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:10
83Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
84Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
85Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
86Internet / Computing / E-commerce / Internet security / Secure communication / Transport Layer Security / Network architecture

KYLE GRAHAM SCHOMP 364 Riverway, #26 Boston, MA5473 https://kyle.schomp.info/

Add to Reading List

Source URL: kyle.schomp.info

Language: English - Date: 2016-05-31 23:40:45
87Security / Prevention / Data security / Safety / Secure communication / Crime prevention / Cryptography / National security / Data breach / Computer security / Information security / Verizon Communications

2016 Data Breach Investigations Report 89% of breaches had a financial or espionage motive.

Add to Reading List

Source URL: regmedia.co.uk

Language: English - Date: 2016-05-12 01:27:36
88Security / Prevention / Privacy / Safety / Data security / Secure communication / Data protection / Identity documents / Data breach / Security breach notification laws / Personally identifiable information / Computer security

Dutch Data Protection Authority The data breach notification obligation as laid down in the Dutch Data Protection Act Policy rules for the application of article 34a under the Dutch Data Protection Act

Add to Reading List

Source URL: autoriteitpersoonsgegevens.nl

Language: English - Date: 2016-03-01 12:36:54
89Computing / Internet / E-commerce / Internet security / Secure communication / Transport Layer Security / Payment Card Industry Data Security Standard / POODLE / SSL acceleration

DOCX Document

Add to Reading List

Source URL: 3fup3p2pb35f2iroyz2x2mre.wpengine.netdna-cdn.com

Language: English - Date: 2016-04-06 08:04:41
90Computing / Internet / Cryptography / Computer network security / Internet Standards / Directory services / Cryptographic protocols / Secure communication / Safe Software / Kerberos / Transport Layer Security / HTTPS

FME® Server Security Table of Contents FME Server Authentication - Access Control

Add to Reading List

Source URL: cdn.safe.com

Language: English - Date: 2015-07-30 16:36:24
UPDATE