Session layer

Results: 98



#Item
1Cryptography / Computing / Hypertext Transfer Protocol / Key management / Cryptographic protocols / Secure communication / HTTP cookie / Transport Layer Security / Public-key cryptography / Encryption / Key / Session

Robert L. Bogue MS MVP, MCSE, MCSA:SecurityPerformance Improvement:

Add to Reading List

Source URL: www.thorprojects.com

Language: English - Date: 2015-07-23 13:05:22
2Planetary science / Spacecraft / Astronomy / Ceres / Dawn / Occator / Asteroid / Planets in astrology / Dwarf planet

47th Lunar and Planetary Science ConferenceTuesday, March 22, 2016 SPECIAL SESSION: CERES UNVEILED: THE NEXT LAYER 8:30 a.m. Waterway Ballroom 4

Add to Reading List

Source URL: www.hou.usra.edu

Language: English - Date: 2016-01-27 15:20:52
3Calculus / Mathematical analysis / Mathematics / Partial differential equations / Calculus of variations / Boundary value problem / Nonlinear system / Shooting method / Boundary layer / SturmLiouville theory / Free boundary problem

SPECIAL SESSIONSpecial Session 22: Topological and Variational Methods for Boundary Value Problems

Add to Reading List

Source URL: www.aimsciences.org

Language: English - Date: 2012-06-23 07:34:34
4Computing / Network architecture / Internet / Network protocols / Internet Standards / Internet protocols / Cryptographic protocols / Secure communication / Transport Layer Security / Transmission Control Protocol / Clientserver model / Session

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:10
5Application layer / Communications protocol / Transmission Control Protocol / Internet Standards

Scribbling Protocols Overview Specification and verification of distributed applications using multiparty session types The Scribble team

Add to Reading List

Source URL: groups.inf.ed.ac.uk

Language: English - Date: 2014-01-10 05:13:26
6Aerodynamics / Differential equations / Fluid dynamics / Partial differential equations / Piping / NavierStokes equations / Boundary layer / Fluid mechanics / Singular perturbation / Euler equations / Stokes equation / Incompressible flow

9th AIMS CONFERENCE – ABSTRACTS 52 Special Session 12: Singular Perturbations and Boundary Layer Theory Makram Hamouda, Indiana University, USA

Add to Reading List

Source URL: www.aimsciences.org

Language: English - Date: 2012-06-23 07:34:27
7

A Modular Security Analysis of the TLS Handshake Protocol P. Morrissey, N.P. Smart and B. Warinschi Abstract We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-06-02 08:20:40
    8Public key infrastructure / Public-key cryptography / Secure communication / Email encryption / Authentication / Transport Layer Security / Dynamic SSL

    My Locker, Your Locker, Our Locker – How to Manage Keys and Certificates Pankaj Kumar Session Objectives

    Add to Reading List

    Source URL: pankaj-k.net

    Language: English - Date: 2007-02-02 01:42:32
    9

    OS03 Marine Geology and Geophysics Wednesday PM Session are atypical for normal (i.e., layer-cake) sections of ocean crust and ophiolites where alteration temperatures in the

    Add to Reading List

    Source URL: www.gyllencreutz.se

    Language: English - Date: 2012-02-05 07:55:33
      10Cryptography / Computing / Internet / Keyword cipher / Password / Obfuscation / Transport Layer Security / Four-square cipher / Classical cipher

      AppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps Fangda Cai, Hao Chen Yuanyi Wu

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2015-05-20 23:58:56
      UPDATE