TLS-SRP

Results: 14



#Item
11Replacing passwords on the Internet AKA post-Snowden Opportunistic Encryption Ben Laurie Google, Inc.  Ian Goldberg

Replacing passwords on the Internet AKA post-Snowden Opportunistic Encryption Ben Laurie Google, Inc. Ian Goldberg

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
12Guidelines for the Selection and Use of Transport Layer Security Implementations

Guidelines for the Selection and Use of Transport Layer Security Implementations

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-24 14:33:59
13Release of NIST Special Publication[removed]Revision 1, Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations, April 2014

Release of NIST Special Publication[removed]Revision 1, Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations, April 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-28 15:17:53
141  Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

Add to Reading List

Source URL: www.secure-resumption.com

Language: English - Date: 2014-02-27 10:40:02