Transport layer

Results: 2091



#Item
31plug´n´trust  plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2011-01-27 05:18:57
32ALOHA LOAD BALANCER MANAGING SSL – CHAINED CERTIFICATES “APPNOTE” #0024 ― MANAGING SSL — CHAINED CERTIFICATES This application note is intended to help you implement SSL management via chained certificates with

ALOHA LOAD BALANCER MANAGING SSL – CHAINED CERTIFICATES “APPNOTE” #0024 ― MANAGING SSL — CHAINED CERTIFICATES This application note is intended to help you implement SSL management via chained certificates with

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:52:21
33Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate policy / Public key certificate / Certificate authority / X.509 / Revocation list / Energy Sciences Network / Root certificate

DOE Science Grid PKI Certificate Policy And Certification Practice Statement

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2003-02-19 17:44:10
34ES265 - Problem Set 5 - Due Thurs 25th Feb 2016 General Advice Problems are divided into S(mall), M(edium) and L(arge). Small problems shouldn’t take you more than a couple of minutes. You should not (generally) need t

ES265 - Problem Set 5 - Due Thurs 25th Feb 2016 General Advice Problems are divided into S(mall), M(edium) and L(arge). Small problems shouldn’t take you more than a couple of minutes. You should not (generally) need t

Add to Reading List

Source URL: www.es.ucsc.edu

Language: English - Date: 2016-02-19 17:21:07
35SafeBreach Stop tomorrow’s breach. Today. In Plain Sight: The Perfect Exfiltration

SafeBreach Stop tomorrow’s breach. Today. In Plain Sight: The Perfect Exfiltration

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2016-05-27 09:10:01
36EBICS Compendium Electronic Banking Internet Communication Standard Document version:  5

EBICS Compendium Electronic Banking Internet Communication Standard Document version: 5

Add to Reading List

Source URL: www.ppi.de

Language: English - Date: 2016-07-08 11:05:07
37Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange

Item Title Consolidated iTC Feedback – DNcPPv2 SD Reviewer iTC Editorial Team Item Identifier NDcPPv2 Supporting Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 09:29:08
38Mamoru Sekido et al.: Development of an e-VLBI Data Transport Software Suite with VDIF, IVS 2010 General Meeting Proceedings, p.410–414 http://ivscc.gsfc.nasa.gov/publications/gm2010/sekido.pdf Development of an e-VLBI

Mamoru Sekido et al.: Development of an e-VLBI Data Transport Software Suite with VDIF, IVS 2010 General Meeting Proceedings, p.410–414 http://ivscc.gsfc.nasa.gov/publications/gm2010/sekido.pdf Development of an e-VLBI

Add to Reading List

Source URL: ivs.nict.go.jp

Language: English - Date: 2011-01-20 18:56:51
39Wireless Optimizer Installation Flexibility Layer 2 Bridge or full function Layer 3 IP Router Configuration Options XipLink wireless optimization software is based on the Space Communication Transport Specification (SCPS

Wireless Optimizer Installation Flexibility Layer 2 Bridge or full function Layer 3 IP Router Configuration Options XipLink wireless optimization software is based on the Space Communication Transport Specification (SCPS

Add to Reading List

Source URL: www.xiplink.com

Language: English - Date: 2010-12-14 17:29:00
40IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13