Secure communication

Results: 3134



#Item
921Data security / Internet privacy / Key escrow / Key / Information security / Secure communication / Clipper chip / Man-in-the-middle attack / Disk encryption / Cryptography / Key management / Public-key cryptography

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
922Network architecture / Secure communication / Internet standards / Cryptographic protocols / Electronic commerce / Transport Layer Security / Server Name Indication / Cipher suite / MIME / Computing / Internet / Internet protocols

Network Working Group Request for Comments: 4366 Obsoletes: 3546 Updates: 4346 Category: Standards Track

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-06-18 12:38:53
923Secure communication / Cryptographic protocols / HTTP / Electronic commerce / Java platform / Digest access authentication / HTTP Secure / Certificate authority / Cross-site scripting / Cryptography / Security / Computing

Securing Java Web Applications This advanced course shows experienced developers of Java web applications how to secure those applications and to apply best practices with regard to secure enterprise coding. Authenticat

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-12-29 13:10:38
924Crime prevention / Electronic commerce / National security / Secure communication / Data security / Public safety / Computer network security / Security / Computer security

Ciphertex to Showcase Innovative Data Security Solutions at 2014 High Technology Crime Investigation Association International Conference & Training Expo Ciphertex Data Security will attend the 2014 HTCIA International C

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-08-25 03:00:58
925Telecommunications / Computer security / TRAC / Aspect-oriented software development / Computing / Business / Secure communication / Security / Interoperability

Interoperable Trust Assurance Infrastructure Objective Develop a dynamic and scalable framework to support trustworthy services and applications in heterogeneous networks and devices, based on the enforcement of interope

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2013-05-24 12:51:56
926Crime prevention / Electronic commerce / National security / Secure communication / Peer-to-peer / Public safety / Computer network / Wireless security / Computer network security / Security / Computer security

Solution Brief: Airlines Secure Airline Connectivity: Protect Critical Assets in the Air and on the Ground The aviation industry has perhaps the most complex and integrated information and communications technology (ICT

Add to Reading List

Source URL: www.temperednetworks.com

Language: English - Date: 2015-03-18 11:42:14
927Public-key cryptography / Cryptographic protocols / Electronic commerce / HTTP / HTTP Secure / IBM / Proxy server / Public key certificate / Transport Layer Security / Cryptography / Computing / Secure communication

Turning wine back into water: Building strategic decisions from the ground up using disaggregated institutional data requires effective processes and IT Julie Arthur and Naomi Doncaster AAIR, November 2009

Add to Reading List

Source URL: www.aair.org.au

Language: English - Date: 2010-11-29 03:37:15
928Public-key cryptography / Cryptographic protocols / Electronic commerce / HTTP / HTTP Secure / IBM / Proxy server / Public key certificate / Transport Layer Security / Cryptography / Computing / Secure communication

Safe Surfing: How to Build a Secure World Wide Web Connection SG24

Add to Reading List

Source URL: www.redbooks.ibm.com

Language: English - Date: 1998-11-10 02:09:07
929Electronic engineering / Electronics / Tandberg / Telepresence / Polycom / Videoconferencing / BT Group / Cisco TelePresence / Tandberg C90 / Videotelephony / Teleconferencing / Computer-mediated communication

One Source for TANDBERG Complete management of enterprise video solutions and secure B2B communications Imagine using business quality video to connect the right people at the right time - no matter what their location o

Add to Reading List

Source URL: www.btconferencing.co.uk

Language: English - Date: 2012-08-13 16:11:46
930Computer network security / Computer security / Crime prevention / Electronic commerce / National security / Secure communication / United States Department of Homeland Security / Geneva Centre for the Democratic Control of Armed Forces / Public–private partnership / Security / Government / Public safety

DCAF Young Faces 2014 – Cybersecurity Winter School for the Western Balkans A COMPREHENSIVE CYBER AWARENESS CAMPAIGN – A ‘PREQUEL’ TO STRONG AND LASTING CYBERSECURITY PPP IN SERBIA AUTHOR: Adel Abusara*

Add to Reading List

Source URL: www.dcaf.ch

Language: English
UPDATE