Wireless Transport Layer Security

Results: 45



#Item
31Cryptographic protocols / Computer network security / Wireless networking / Simple public key infrastructure / Extensible Authentication Protocol / IEEE 802.1X / Transport Layer Security / Authorization certificate / Wireless security / Cryptography / Public-key cryptography / Key management

Greenpass: Decentralized, PKI-based Authorization for Wireless LANs∗ Nicholas C. Goffee, Sung Hoon Kim, Sean Smith, Punch Taylor, Meiyuan Zhao, John Marchesini Department of Computer Science/Dartmouth PKI Lab† Dartmo

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-03-24 17:11:37
32Cryptographic protocols / Secure communication / Internet / Electronic commerce / Transport Layer Security / RC4 / Wireless security / Cryptography / Computing / Internet standards

Internet Security Policies Protecting your personal information at Tee-On.com SSL Encryption: Whenever a golf course requires a credit card to reserve a tee time, Tee-On uses a technology called Secure Socket Layer (SSL)

Add to Reading List

Source URL: www.tee-on.com

Language: English - Date: 2013-10-28 11:23:16
33Open standards / Internet protocols / Open Mobile Alliance / Wireless networking / Wireless Application Protocol / Vision Mobile Browser / Multimedia Messaging Service / Wireless Transport Layer Security / Wireless Session Protocol / Technology / Mobile technology / Computing

Generic Content Download Over The Air Specification Version 1.0 Proposed Version 20-June-2002 Open Mobile Alliance OMA-Download-OTA-v1_0[removed]p

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-08-05 10:51:00
34Internet / Wireless networking / Data / Computer network security / Dynamic Host Configuration Protocol / Transport Layer Security / Extensible Authentication Protocol / Wireless security / Internet standards / Computing / Cryptographic protocols

3eTI Security Policy_Apr_25.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
35Computer security / Computer network security / Cryptographic software / Wireless networking / Secure communication / Extensible Authentication Protocol / Transport Layer Security / Wireless security / Security and safety features new to Windows Vista / Computing / Cryptographic protocols / Cryptography

3eTI Client Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
36Cryptographic protocols / Computer network security / Extensible Authentication Protocol / X Window System / Transport Layer Security / IEEE 802.1X / Wireless bridge / Wireless LAN / Computing / Software / Wireless networking

3eTI Security Policy 3e-527A3 Nov[removed]v7

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-11-27 00:00:00
37Mobile telecommunications / Videotelephony / Radio resource management / Universal Mobile Telecommunications System / Personal Communications Service / Digital AMPS / GSM / General Packet Radio Service / Wireless Transport Layer Security / Technology / Electronic engineering / Mobile technology

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2014-07-22 16:25:43
38Cyberwarfare / Virtual private network / Network security / Split tunneling / Transport Layer Security / Network Access Control / Mobile virtual private network / Wireless security / Computer network security / Computing / Computer security

The Authenticated Network Architecture Sean Convery Chief Technology Officer Identity Engines, Inc. The Authenticated Network Architecture

Add to Reading List

Source URL: seanconvery.com

Language: English - Date: 2009-03-20 22:07:30
39Network architecture / Wireless Application Protocol / Cryptographic protocols / Internet standards / Wireless access point / Transport Layer Security / WAP gateway / Wireless Markup Language / Computing / Internet / Internet protocols

Wireless Application Protocol Sridhar Iyer KR School of Information Technology IIT Bombay http://www.it.iitb.ernet.in/~sri

Add to Reading List

Source URL: www.it.iitb.ac.in

Language: English - Date: 2009-08-10 09:19:26
40Computing / Internet protocols / Public-key cryptography / Internet standards / Transport Layer Security / Cipher suite / Wireless security / SSL acceleration / HTTP Secure / Cryptography / Cryptographic protocols / Secure communication

Security Issues in Mobile Computing Srikanth Pullela Department of Computer Science

Add to Reading List

Source URL: crystal.uta.edu

Language: English - Date: 2002-11-04 12:10:11
UPDATE