Transport Layer Security

Results: 1523



#Item
381Information / Communications protocol / Transport Layer Security / Security protocol notation / Public-key cryptography / Transmission Control Protocol / Diffie–Hellman key exchange / HMAC / Cryptographic protocols / Cryptography / Data

AnBx - Security Protocols Design and Verification? Michele Bugliesi and Paolo Modesti Universit` a Ca’ Foscari Venezia Dipartimento di Informatica {bugliesi,modesti}@dsi.unive.it

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2010-06-10 05:02:59
382Phishing / Social engineering / Spamming / Cryptographic protocols / Cross-site scripting / Password / Two-factor authentication / Transport Layer Security / Transaction authentication number / Cybercrime / Computing / Security

Phishing with Super Bait Jeremiah Grossman WhiteHat Security Founder and Chief Technology Officer

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:35
383Internet standards / Internet protocols / FTP / Cryptographic protocols / FTPS / File Transfer Protocol / Secure Shell / Transport Layer Security / Sysax Multi Server / Internet / Computing / Network architecture

H High Performance Secure FTP/SFTP Server TurboSoft develops secure file transfer client and server products which offer manageable, scalable, automated file transfer solution. Share information

Add to Reading List

Source URL: www.tbsoftinc.com

Language: English - Date: 2009-08-07 00:06:19
384Internet protocols / Cryptographic protocols / Internet standards / Public-key cryptography / Key management / Transport Layer Security / Key distribution / Email / Peer-to-peer / Cryptography / Computing / Internet

Scaling Secure Group Communication Systems: Beyond Peer-to-Peer Yair Amir ∗ Cristina Nita-Rotaru ∗ Jonathan Stanton †

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:36
385Data / Information / Secure communication / Internet standards / Datagram Transport Layer Security / Handshaking / Transport Layer Security / Internet protocols / Cryptographic protocols / Computing

INTERNATIONAL TELECOMMUNICATION UNION COM 16 – LS 142 – E TELECOMMUNICATION STANDARDIZATION SECTOR

Add to Reading List

Source URL: datatracker.ietf.org

Language: English - Date: 2015-03-04 15:15:03
386Computer-mediated communication / Email / Secure messaging / Gmail / Google Apps / Google Talk / Instant messaging / Secure communication / Transport Layer Security / Computing / Internet privacy / Internet

Google Message Encryption ABOUT GOOGLE APPS Google Apps is a suite of applications that includes Gmail, Google Calendar (shared calendaring), Google Talk

Add to Reading List

Source URL: www.spaminabox.co.za

Language: English - Date: 2009-06-09 06:29:13
387Global Technology Associates /  Inc. / Transport Layer Security / Virtual private network / Cisco Systems VPN Client / SSL-Explorer: Community Edition / UT-VPN / Computer network security / Computing / Tunneling protocols

PRESS RELEASE FOR IMMEDIATE RELEASE 3505 Lake Lynda Drive, Suite 109

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-10-09 15:50:06
388File sharing networks / Cryptographic protocols / Secure communication / Cross-platform software / Kademlia / Peer-to-peer / Distributed hash table / Kad network / Transport Layer Security / Software / Computing / Distributed data storage

UNIVERSITY OF MANNHEIM Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia

Add to Reading List

Source URL: www.philippheckel.com

Language: English - Date: 2009-11-25 08:49:15
389Internet standards / Internet protocols / Email / HTTP / Cryptographic protocols / Hypertext Transfer Protocol / Transport Layer Security / URI scheme / Representational state transfer / Computing / Internet / Network architecture

Internet Engineering Task Force (IETF) Request for Comments: 7230 Obsoletes: 2145, 2616 Updates: 2817, 2818 Category: Standards Track ISSN:

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-06-06 21:14:27
390Secure communication / Electronic commerce / Learning with errors / NTRU / Transport Layer Security / Cipher suite / Elliptic curve cryptography / Quantum computer / RSA / Cryptography / Cryptographic protocols / Internet protocols

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:27:47
UPDATE