Opportunistic encryption

Results: 30



#Item
1

draft-ietf-httpbis-http2-encryption-08 - Opportunistic Security for HTTP

Add to Reading List

Source URL: tools.ietf.org

- Date: 2016-11-01 23:04:15
    2Cryptography / Computing / Internet / Public-key cryptography / Internet protocols / Internet Standards / Cryptographic software / Email / Domain Name System Security Extensions / X.509 / Domain Name System / Opportunistic encryption

    Intro The Plan Implementation

    Add to Reading List

    Source URL: www.g10code.de

    Language: English - Date: 2015-11-01 10:38:20
    3Computing / Email / Cyberspace / Internet privacy / Secure communication / Opportunistic TLS / Transport Layer Security / Simple Mail Transfer Protocol / Extended SMTP / Email encryption / Opportunistic encryption / Gmail

    Uncovering Cryptographic Failures 
 with Internet-Wide Measurement Zakir Durumeric University of Michigan

    Add to Reading List

    Source URL: zakird.com

    Language: English
    4Email / Internet protocols / Spam filtering / Message transfer agents / Opportunistic TLS / Simple Mail Transfer Protocol / DMARC / Postfix / Transport Layer Security / DomainKeys Identified Mail / Opportunistic encryption / Extended SMTP

    Neither Snow Nor Rain Nor MITMAn Empirical Analysis of Email Delivery Security Zakir Durumeric† David Adrian† Ariana Mirian† James Kasten† Elie Bursztein‡ Nicolas Lidzborski‡ Kurt Thomas‡ Vijay Erant

    Add to Reading List

    Source URL: zakird.com

    Language: English
    5Computing / Cryptography / Network architecture / IPsec / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / StrongSwan / Internet Key Exchange / Opportunistic encryption / NAT traversal

    Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2006-04-27 10:23:08
    6Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / Internet Key Exchange / StrongSwan / Opportunistic encryption / NAT traversal

    strongSwan The new IKEv2 VPN Solution Andreas Steffen Copyright © 2007 by Andreas Steffen

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2007-05-26 10:12:50
    7Cryptography / Computing / Software / Security / Computer security / Password / Internet privacy / Public-key cryptography / Web application / Data Protection API / Dynamic SSL

    Private Use of Untrusted Web Servers via Opportunistic Encryption

    Add to Reading List

    Source URL: w2spconf.com

    Language: English - Date: 2012-02-07 16:10:03
    8Computing / Internet protocols / Cryptographic software / Email / Cryptographic protocols / X.509 / Domain Name System Security Extensions / Opportunistic encryption / S/MIME / Cryptography / Internet / Public-key cryptography

    Intro The Plan Implementation

    Add to Reading List

    Source URL: www.g10code.com

    Language: English - Date: 2011-11-14 04:16:35
    9Cryptography / IPsec / Internet Key Exchange / Racoon / Openswan / Netfilter / StrongSwan / Network address translation / Opportunistic encryption / Cryptographic protocols / Computing / Network architecture

    Openswan - IPsec on Linux for the Future 7. Juni 2004 Legal Notice Dieser Beitrag ist lizensiert unter der GNU General Public License. Zusammenfassung The world of IPsec on Linux is a confusing one at the moment. With Ke

    Add to Reading List

    Source URL: www.free-it.org

    Language: English - Date: 2005-03-10 13:07:07
    10Secure communication / Network architecture / Internet standards / Internet protocols / HTTP / Transport Layer Security / HTTP Secure / URI scheme / Opportunistic encryption / Internet / Computing / Cryptographic protocols

    GSM Association Official Document WWG.04 - Network Management of Encrypted Traffic Non-confidential Network Management of Encrypted Traffic

    Add to Reading List

    Source URL: www.gsma.com

    Language: English - Date: 2015-03-10 07:01:32
    UPDATE