Security domain

Results: 1374



#Item
201Computing / Domain Name System Security Extensions / DNS spoofing / Name server / Google Public DNS / Man-in-the-middle attack / PowerDNS / Anycast / CNAME record / Internet / Domain name system / Network architecture

2014 IEEE Security and Privacy Workshops Towards Forensic Analysis of Attacks with DNSSEC Haya Shulman and Michael Waidner Fachbereich Informatik Technische Universit¨at Darmstadt

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:51
202Software licenses / NLnet / NSD / Domain name system / International nongovernmental organizations / Nonprofit technology / BIND / Domain Name System Security Extensions / Open-source software / Computing / Software / System software

© 2002 Stichting NLnet Stichting NLnet Annual Report 2001 office address

Add to Reading List

Source URL: nlnet.nl

Language: English - Date: 2011-01-25 04:59:50
203Computing / Internet protocols / Cryptographic software / Email / Cryptographic protocols / X.509 / Domain Name System Security Extensions / Opportunistic encryption / S/MIME / Cryptography / Internet / Public-key cryptography

Intro The Plan Implementation

Add to Reading List

Source URL: www.g10code.com

Language: English - Date: 2011-11-14 04:16:35
204Coproduction / Economics / Citizenship / E-Government / Mediation / Participation / Structure / E-participation / Government / Technology / Politics

Citizens in security. Taking stock of citizen participation in social safety This report deals with the question what forms of citizen participation in the domain of social (or community) safety can currently be observed

Add to Reading List

Source URL: wodc.nl

Language: English - Date: 2014-11-12 08:14:34
205Computing / Internet protocols / Internet standards / Key management / DNSSEC / Domain Name System Security Extensions / TSIG / DNS spoofing / Name server / Domain name system / Internet / Network architecture

DNSSEC HOWTO, a tutorial in disguise Olaf Kolkman Revision 136 April 7, 2010 Download the most recent PDF release from:

Add to Reading List

Source URL: www.dns-school.org

Language: English - Date: 2014-11-25 09:40:06
206Computing / Network architecture / Network management / System administration / Domain name system / Domain Name System Security Extensions / Syslog / DNS zone transfer / Rsyslog / Internet protocols / Internet / Internet standards

DNS/DNSSEC Workshop Logging This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be freely copied, modified, and otherwise re-used on the condition tha

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2015-02-17 16:20:56
207Network architecture / Internet protocols / Extensible Provisioning Protocol / Domain Name System Security Extensions / XML / Domain name / Internet Standard / Computing / Domain name system / Internet

draft-gieben-epp-keyrelay-02 - Key Relay Mapping for the Extensible Provisioning Protocol

Add to Reading List

Source URL: www.sidnlabs.nl

Language: English - Date: 2013-04-15 01:41:47
208Internet / GNUnet / File sharing networks / Anonymity / Alice and Bob / Peer-to-peer / ICANN / Domain name / Domain name system / Software / Computing

Peer-to-Peer Systems and Security Attacks! Christian Grothoff Technische Universit¨ at M¨ unchen

Add to Reading List

Source URL: grothoff.org

Language: English - Date: 2013-06-04 10:22:31
209Network architecture / Internet privacy / Internet protocols / Internet ethics / Computer network security / Tor / Domain name / Botnet / Domain name system / Internet / Computing

A Privacy framework for DNS big data 3 October 2014 Cristian Hesselman, Jelte Jansen, Maarten Wullink, Karin Vink en Maarten Simon

Add to Reading List

Source URL: www.sidnlabs.nl

Language: English - Date: 2014-11-04 04:48:17
210Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
UPDATE