Transport layer

Results: 2091



#Item
31Cryptography / Computer access control / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Multi-factor authentication / One-time password / Authentication / Security token / Identity management system / Public key certificate

plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2011-01-27 05:18:57
32Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / E-commerce / Root certificate / Public key certificate / Certificate authority / Intermediate Certificate Authority / Chain of trust

ALOHA LOAD BALANCER MANAGING SSL – CHAINED CERTIFICATES “APPNOTE” #0024 ― MANAGING SSL — CHAINED CERTIFICATES This application note is intended to help you implement SSL management via chained certificates with

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:52:21
33Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate policy / Public key certificate / Certificate authority / X.509 / Revocation list / Energy Sciences Network / Root certificate

DOE Science Grid PKI Certificate Policy And Certification Practice Statement

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2003-02-19 17:44:10
34Fluid dynamics / Aerodynamics / Engineering / Chemical engineering / Piping / Chaos theory / Transport phenomena / Turbulence / Boundary layer

ES265 - Problem Set 5 - Due Thurs 25th Feb 2016 General Advice Problems are divided into S(mall), M(edium) and L(arge). Small problems shouldn’t take you more than a couple of minutes. You should not (generally) need t

Add to Reading List

Source URL: www.es.ucsc.edu

Language: English - Date: 2016-02-19 17:21:07
35Security / Computing / Prevention / Secure communication / E-commerce / Crime prevention / Cryptography / National security / Trusteer / Itzik Kotler / Transport Layer Security / Computer security

SafeBreach Stop tomorrow’s breach. Today. In Plain Sight: The Perfect Exfiltration

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2016-05-27 09:10:01
36Computing / Technology / Cryptography / Online banking / E-commerce / Technical communication / Electronic Banking Internet Communication Standard / Real-time gross settlement / FTAM / German Banking Industry Committee / Transport Layer Security / FinTS

EBICS Compendium Electronic Banking Internet Communication Standard Document version: 5

Add to Reading List

Source URL: www.ppi.de

Language: English - Date: 2016-07-08 11:05:07
37Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange

Item Title Consolidated iTC Feedback – DNcPPv2 SD Reviewer iTC Editorial Team Item Identifier NDcPPv2 Supporting Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 09:29:08
38Computing / Network architecture / Internet protocols / OSI protocols / Internet Standards / Interferometry / Astronomical imaging / Very-long-baseline interferometry / Internet protocol suite / European VLBI Network / Transmission Control Protocol / Transport layer

Mamoru Sekido et al.: Development of an e-VLBI Data Transport Software Suite with VDIF, IVS 2010 General Meeting Proceedings, p.410–414 http://ivscc.gsfc.nasa.gov/publications/gm2010/sekido.pdf Development of an e-VLBI

Add to Reading List

Source URL: ivs.nict.go.jp

Language: English - Date: 2011-01-20 18:56:51
39Computing / Internet / Network architecture / Internet Standards / Internet protocols / Routing protocols / Networking hardware / Computer networking / Router / Open Shortest Path First / Border Gateway Protocol / IP address

Wireless Optimizer Installation Flexibility Layer 2 Bridge or full function Layer 3 IP Router Configuration Options XipLink wireless optimization software is based on the Space Communication Transport Specification (SCPS

Add to Reading List

Source URL: www.xiplink.com

Language: English - Date: 2010-12-14 17:29:00
40Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
UPDATE