Transport Layer Security

Results: 1523



#Item
971Internet standards / Network architecture / Cryptographic protocols / Network management / System administration / Datagram Transport Layer Security / Syslog / Simple Network Management Protocol / Transport Layer Security / Internet protocols / Computing / Internet

Position Paper for W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT) Hardening Operations and Management Against Passive Eavesdropping Bernard Aboba, Microsoft Corporation

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
972Computer network security / Internet / Internet protocols / TCP/IP / Tcpcrypt / Internet standards / Transport Layer Security / Wireless security / IPsec / Cryptographic protocols / Computing / Data

Simple Opportunistic Encryption Andrea Bittau Michael Hamburg Mark Handley David Mazi`eres Dan Boneh

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
973Computing / URI schemes / Network architecture / Internet standards / Internet protocols / Transport Layer Security / HTTP Secure / Opportunistic encryption / Uniform resource identifier / Cryptographic protocols / Internet / Secure communication

draft-nottingham-http2-encryption-02 - Opportunistic Encryption for HTTP URIs

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
974Security / Secure communication / Computer network security / Internet protocols / HTTP / HTTP Secure / Authentication / Opportunistic encryption / Transport Layer Security / Cryptographic protocols / Cryptography / Computing

Trust  Issues  with  Opportunistic  Encryption   Scott  Rose,  Stephen  Nightingale,  Doug  Montgomery   {scottr,  night,  [removed]}   National  Institute  of  Sta

Add to Reading List

Source URL: www.had-pilot.com

Language: English - Date: 2014-03-21 15:07:13
975Cryptographic protocols / Network architecture / Secure communication / Network protocols / Computer network security / HTTP cookie / Transport Layer Security / Session / Cross-site request forgery / Computing / HTTP / Internet

1 Eradicating Bearer Tokens for Session Management Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium {firstname.lastname}@cs.kuleuven.be

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
976Internet / Secure communication / HTTP / Internet standards / Transport Layer Security / HTTP Secure / Secure Hypertext Transfer Protocol / Communications protocol / URI scheme / Computing / Cryptographic protocols / Data

A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring https://www.w3.org/2014/strint/ Strengthening the path and strengthening the end-points Xavier Marjou, Emile Stephan, Jean-Michel Combes, Iun

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
977Computer-mediated communication / Cryptographic protocols / Spam filtering / Internet standards / DomainKeys Identified Mail / S/MIME / Simple Mail Transfer Protocol / Transport Layer Security / MIME / Computing / Email / Internet

draft-crocker-strint-workshop-messaging-00 - STRINT Workshop Position Paper: Levels of Opportunistic Privacy Protection for Messaging-Oriented Architectures

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
978Computing / Secure messaging / Electronics / Internet security / Transport Layer Security / Internet privacy / Email / Internet

SOC 3 for Security, Availability, Processing Integrity, and Confidentiality Independent Practioner’s Trust Services Report For the Period May 1, 2013 through October 15, 2014 Independent SOC 3 Report for the Security,

Add to Reading List

Source URL: cert.webtrust.org

Language: English - Date: 2014-12-02 09:11:00
979Computing / Software / Internet protocols / Internet standards / Secure communication / Transport Layer Security / Microsoft CryptoAPI / Public key certificate / Application programming interface / Cryptography / Electronic commerce / Cryptographic software

Developer-Resistant Cryptography Kelsey Cairns and Graham Steel Abstract “Properly implemented strong crypto systems are one of the few things that you can rely on” - Edward Snowden. So why is mass surveillance so su

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
980Cross-platform software / Extensible Messaging and Presence Protocol / Online chat / XMPP Standards Foundation / Transport Layer Security / Presence information / BOSH / Jingle / Computing / Instant messaging / Computer-mediated communication

draft-saintandre-strint-workshop-xmpp-00 - STRINT Workshop Position Paper: Strengthening the Extensible Messaging and Presence Protocol XMPP‚

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
UPDATE