Security domain

Results: 1374



#Item
21Computing / Internet / Domain name system / Network architecture / Internet protocols / Internet Standards / Domain Name System Security Extensions / Google Public DNS / Name server / DNSCrypt / Transmission Control Protocol / DNSCurve

2015 IEEE Symposium on Security and Privacy Connection-Oriented DNS to Improve Privacy and Security Liang Zhu∗ , Zi Hu∗ , John Heidemann∗ , Duane Wessels† , Allison Mankin† , Nikita Somaiya∗ ∗ USC/Informat

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:06
22Domain name system / Internet / Computing / Network architecture / Root name server / Name server / Domain name / DNS hosting service / Domain Name System Security Extensions / DNS zone

DNS data collection and analysis Kazunori Fujiwara, JPRS <> Copyright © 2015 Japan Registry Services Co., Ltd.

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-30 06:39:46
23Computing / Security / E-commerce / Cyberwarfare / Domain Name System / Frontotemporal lobar degeneration / Computer security / Domain name

2016 Security Requirements: What Service Providers Need to Know June 9, 2016 Webinar Guidelines •

Add to Reading List

Source URL: www.ftld.com

Language: English - Date: 2016-08-02 14:05:01
24Internet / Domain name system / Country code top-level domains / Computing / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / OpenDNSSEC / .dk / .fr / .mn

OpenDNSSEC Matthijs Mekking NLnet Labs 13 Jan 2011

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-01-10 09:01:00
25Domain name system / Internet / Computing / Network architecture / DNS spoofing / Domain Name System Security Extensions / Name server / DNS zone / Pharming / Comparison of DNS server software / Google Public DNS

DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0 ∗

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
26Security / Cyberwarfare / Computing / Public-key cryptography / Resource Public Key Infrastructure / Cryptography / Netnod / Computer security / Vulnerability

Inter-­‐domain  rou.ng  security   Stocktaking,  state-­‐of-­‐the  art,  and   future  perspec.ves   IEPG,  IETF  78,  Maastricht,  The  Netherlands  

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2010-07-25 05:37:06
27Computing / Internet / Internet Standards / Internet protocols / Network architecture / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Domain Name System / Hash table / Namespace

Design of a Secure and Decentralized Location Service for Agent Platforms B.J. Overeinder1 , M.A. Oey1 , R.J. Timmer1 , R. van Schouwen1 , E. Rozendaal2 , and F.M.T. Brazier1 1

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
28Computer network security / Computing / Computer security / Internet privacy / Crypto-anarchism / Network architecture / Virtual private network / Cyberwarfare / Password

SELF SERVICE PORTAL DOCUMENTATION – REQUESTING A VPN ACCOUNT Go to _https://vpnportal.vansoc.va.gov/selfservice_ to begin the remote access request, using your VA Windows domain credentials: the Username that begins wi

Add to Reading List

Source URL: uthscsa.edu

Language: English - Date: 2014-03-19 17:04:50
29Cryptography / Internet / Computing / Internet protocols / Internet Standards / Domain name system / Key management / Public-key cryptography / Domain Name System Security Extensions / Digital signature / Zone file

.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006 NLnet Labs document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
30Cryptography / Computing / Internet / Public-key cryptography / Internet protocols / Internet Standards / Cryptographic software / Email / Domain Name System Security Extensions / X.509 / Domain Name System / Opportunistic encryption

Intro The Plan Implementation

Add to Reading List

Source URL: www.g10code.de

Language: English - Date: 2015-11-01 10:38:20
UPDATE