Transport layer

Results: 2091



#Item
331Computing / Internet / Computer security / Internet security / Transport Layer Security / Software testing / Cryptographic software / Cryptographic protocols / Heartbleed / OpenSSL / Codenomicon / Vulnerability

Heartbleed_story_2014-09-24

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
332Computing / Network architecture / Wireless networking / OSI protocols / IEEE 802.11 / Wireless sensor network / Collection Tree Protocol / Carrier sense multiple access with collision avoidance / Data link layer / Ethernet / Conference on Embedded Networked Sensor Systems / Transport layer

Opening the Sensornet Black Box Jung Il Choi, Jung Woo Lee, Megan Wachs, and Philip Levis Computer Systems Laboratory Stanford University Stanford, CA 94305

Add to Reading List

Source URL: sing.stanford.edu

Language: English - Date: 2014-11-10 18:30:15
333Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / E-commerce / Certificate authority / DigiCert / Certificate policy / CyberTrust / Public key certificate / X.509

Microsoft Word - DigiCert_CPS_v408-1-Apr-2015.doc

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2016-03-03 14:10:03
334Internet privacy / Secure communication / Computer networking / Cryptographic protocols / Transport Layer Security / Proxy server / Transmission Control Protocol / HTTPS / Internet protocol suite / Session Initiation Protocol

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2016-01-05 05:04:04
335Secure communication / Internet Standards / Cryptographic protocols / Cryptographic software / Transport Layer Security / Handshaking / FTPS / SSL acceleration

DIMACS Security & Cryptography Crash Course – day 4 Internet Cryptography Tools, Part I: TLS/SSL Prof. Amir Herzberg

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2003-07-30 14:06:03
336Cryptography / Key management / E-commerce / Public key infrastructure / Public-key cryptography / Transport Layer Security / GeoTrust / Extended Validation Certificate / Wildcard certificate / Certificate authority / Public key certificate

DATA SHEET GeoTrust® True BusinessID Wildcard Secure multiple host names at minimal cost. Whether it’s your company’s home page or your mail server’s host name, protecting sensitive

Add to Reading List

Source URL: www.geotrust.com

Language: English - Date: 2015-10-07 16:55:43
337Cryptographic protocols / Secure communication / Internet protocols / Transport Layer Security / Network protocols / Transmission Control Protocol / HTTPS / Ciphertext indistinguishability / Initialization vector / Hypertext Transfer Protocol / Block cipher mode of operation / Keystream

This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2015-11-02 11:01:00
338Internet protocols / Secure communication / Internet Standards / Transmission Control Protocol / Relay / Tor / Transport layer / Internet Relay Chat flood / HTTPS / Denial-of-service attack / Quality of service / Internet Relay Chat

IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2014-09-10 17:17:22
339Secure communication / Cryptographic protocols / Cryptographic software / Public-key cryptography / Internet Standards / Cipher suite / X.509 / Netscape / Transport Layer Security

SSL: Paved With Good Intentions

Add to Reading List

Source URL: www.westpoint.ltd.uk

Language: English - Date: 2015-10-01 10:06:33
340Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
UPDATE