Cryptographic protocols

Results: 3642



#Item
81Computing / Network architecture / Internet / Cryptographic protocols / Secure communication / Transport Layer Security / Internet protocols / Internet Standards / HTTPS / Opportunistic TLS / Email client / Simple Mail Transfer Protocol

Proceedings on Privacy Enhancing Technologies 2016; ):1–18 Shuai Li* and Nicholas Hopper Mailet: Instant Social Networking under Censorship

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2016-06-28 22:06:37
82Computing / Network architecture / Internet / Internet protocols / Network protocols / Network management / Cryptographic protocols / Secure communication / Transmission Control Protocol / Simple Mail Transfer Protocol / Load balancing / Hypertext Transfer Protocol

ALOHA LOAD BALANCER CHECKING THE HEALTH OF APPLICATION SERVERS “APPNOTE” #0013 ― LIST OF CHECKS IN ALOHA This application note is intended to list the main checks available in the Aloha solution to be sure of the s

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:44:16
83Computing / Computer security / Cyberwarfare / Cryptographic protocols / Secure communication / Computer network security / Internet protocols / Computer access control / Cross-site scripting / Cheat sheet / Cross-site request forgery / Cheating in video games

OWASP Cheat Sheets Martin Woschek, April 9, 2015 Contents I

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-04-23 16:03:46
84Cryptographic protocols / WLAN Authentication and Privacy Infrastructure / Computing / Wireless security / IEEE 802.11i-2004 / IEEE 802.11 / Registration authority / Reference / Engineering

November 2005 doc.: IEEE1205r0 IEEE P802.11 Wireless LANs IEEEWorking Group Comments on 1N7904 Date:

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2006-02-03 09:11:22
85Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / Certificate policy / Certificate authority / Revocation list / Public key certificate / X.509 / Kek

KEK GRID CA Service Certificate Policy and Certificate Practices Statements Ver

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2015-09-20 21:40:31
86IEEE 802.11 / Computer network security / Wireless networking / Computing / Cryptographic protocols / Wi-Fi / Password / Computer security / Prevention

Connecting to KSU-HOUSING Wi-Fi on WindowsOn the bottom right of your desktop, open up your wireless networks then open the Network and Sharing Center.

Add to Reading List

Source URL: ksuhousing.kennesaw.edu

Language: English - Date: 2015-09-01 10:59:01
87Cryptography / Public-key cryptography / Secure communication / Financial cryptography / Cryptographic protocols / Privacy-enhancing technologies / Digital signature / Proxy server / Internet privacy / Anonymity / Enhanced privacy ID / Pseudonymity

Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:14
88Computing / Network architecture / Internet / Network performance / Cryptographic protocols / Secure communication / Internet protocols / Flow control / Transmission Control Protocol / Transport Layer Security / TCP congestion control / HTTPS

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
89Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / Certificate policy / Certificate authority / Revocation list / Public key certificate / X.509 / Kek

Microsoft Word - KEK-GRID-CPCPSdoc

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2010-11-01 03:20:32
90Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / X.509 / Certificate authority / Online Certificate Status Protocol / Public key certificate / Lightweight Directory Access Protocol / Revocation list

DOEGrids CA Release Notes Revision: Introduction The New DOEGrids Certificate Authority is ready for deployment by the operations staff. This document discusses the new service and the changes

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2003-04-08 19:00:32
UPDATE