Security domain

Results: 1374



#Item
811Internet protocols / Generic top-level domains / Internet standards / Identifiers / Domain Name System Security Extensions / Verisign / Top-level domain / .com / Internet / Domain name system / Network architecture

Verisign  DNSSEC  Practice  Statement  for   TLD/GTLD  Zone   Version  1.2     Effective  Date:  November  26,  2014      

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-11-26 12:35:04
812Cryptographic protocols / Computing / Electronic commerce / Security / Public key certificate / Email / X.509 / Certificate authority / Domain name / Public-key cryptography / Key management / Internet

i.STAR Implementation Overview Quick Reference We want to draw your attention to this checklist of key information to get your i.STAR site project on its way

Add to Reading List

Source URL: www.istarhelp.com

Language: English - Date: 2011-01-31 20:21:00
813Formal methods / Formal specification / Java virtual machine / Kernel / Programming language / Specification / Computer security / Domain / Abstraction / Computing / Software / Cross-platform software

An Avenue for High Confidence Applications in the 21st Century Timothy W. Kremann William B. Martin Frank Seaton Taylor ftimk, bradm, [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
814Domain name system / Internet protocols / Internet standards / Internet Protocol / Internet privacy / Domain Name System Security Extensions / DNS spoofing / Name server / Extension mechanisms for DNS / Internet / Network architecture / Computing

Netalyzr: Illuminating The Edge Network Christian Kreibich Nicholas Weaver ICSI

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-09-05 13:46:26
815Cryptographic protocols / Internet protocols / Internet standards / Domain Name System Security Extensions / Public key certificate / X.509 / HTTP Secure / Cryptography / Public-key cryptography / Key management

Why Provable Transparency is Useful Against Surveillance Ben Laurie, Google (benl@google,com), 11 Jan 2014. Background Certificate Transparency (RFC 6962) is an example of a general mechanism which perm

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
816Network architecture / Domain Name System Security Extensions / DNS spoofing / Extension mechanisms for DNS / Content delivery network / TSIG / Domain name registrar / Name server / .org / Domain name system / Internet / Computing

AT&T Content Delivery Network Service with Web Security Enhanced Domain Name

Add to Reading List

Source URL: www.corp.att.com

Language: English - Date: 2013-07-29 11:48:09
817Legal terms / Real property law / Lost /  mislaid /  and abandoned property / Personal property law / Escheat / Property / Eminent domain / Security / Life insurance / Law / Property law / Common law

TITLE 67 State Officers and Employees Chapter 4a Unclaimed Property Act Part 1. General Provisions

Add to Reading List

Source URL: www.mine.utah.gov

Language: English - Date: 2011-03-02 00:10:24
818Cryptographic protocols / Internet protocols / Internet standards / Computer network security / Secure communication / Secure Shell / HTTP Secure / Domain Name System Security Extensions / Internet security / Computing / Internet / Network architecture

Meet the new threat model, same as the old threat model Eric Rescorla Mozilla [removed] January 20, 2014

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
819Computing / Domain Name System Security Extensions / Name server / DNS zone / Reverse DNS lookup / Domain name / Microsoft DNS / DNS spoofing / Domain name system / Internet / Network architecture

Practical Comprehensive Bounds on Surreptitious Communication Over DNS Vern Paxson∗ Mihai Christodorescu† Mobin Javed Josyula Rao‡ Reiner Sailer‡ ‡ ‡ 

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2013-06-29 11:26:59
820Domain name system / Internet ethics / Internet privacy / Privacy / Censorship of YouTube / Internet censorship / DNS hijacking / Proxy server / OpenDNS / Internet / Computing / Computer network security

A Look at the Consequences of Internet Censorship Through an ISP Lens Sheharbano Khattak1 , Mobin Javed2 , Syed Ali Khayam3 , Zartash Afzal Uzmi4 , Vern Paxson2,5 1 University of Cambridge, 2 UC Berkeley, 3 PLUMgrid, 4

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-09-18 14:16:36
UPDATE