Secure communication

Results: 3134



#Item
841Secure communication / Technology / HP Web Jetadmin / Jetadmin / Computer printers / Office equipment / Hewlett-Packard / HTTP Secure / Transport Layer Security / Computing / Internet / Cryptographic protocols

Microsoft Word - hpwja_security_whitepaper_en.doc

Add to Reading List

Source URL: www.cannon4.com

Language: English - Date: 2011-01-04 11:35:15
842Crime prevention / National security / Computer network security / Electronic commerce / Secure communication / Malware / Vulnerability / Privacy / Internet privacy / Security / Computer security / Ethics

Agenda Review Process Program Chairs’ Report David Evans University of Virginia

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2010-05-25 02:29:19
843Cyberwarfare / Computing / Data security / Secure communication / National security / Data breach / Information security / Internet privacy / Threat / Security / Computer network security / Computer security

VZB60021_WP_DBIR_Insides_v6a_kb.indd

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2009-04-13 20:00:00
844Cryptographic protocols / Public-key cryptography / Secure communication / Key management / Electronic commerce / Certificate server / HTTP Secure / Transport Layer Security / OpenSSL / Cryptography / Software / System software

Installing Apache 2.2 with SSL/TLS on Windows Installing Apache 2.2 with SSL/TLS on Windows Published by the Open Source Software Lab at Microsoft. DecemberSpecial thanks to Chris Travers, Contributing Author to

Add to Reading List

Source URL: www.apachelounge.com

Language: English - Date: 2008-03-02 05:38:04
845Network architecture / Internet privacy / Cryptographic protocols / Secure communication / Internet standards / HTTP cookie / Transport Layer Security / Session / Proxy server / Computing / Internet / HTTP

A Secure Cookie Protocol Alex X. Liu1 , Jason M. Kovacs Chin-Tser Huang Mohamed G. Gouda

Add to Reading List

Source URL: www.cse.msu.edu

Language: English - Date: 2009-10-22 00:05:46
846Cryptographic protocols / Secure multi-party computation / IP / Communication complexity / Communications protocol / FO / Theoretical computer science / Applied mathematics / Cryptography

Multiparty Computation for Interval, Equality, and Comparison without Bit-Decomposition Protocol Takashi Nishide1,2 and Kazuo Ohta1 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-17 02:37:29
847Computing / Cryptography / Internet / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / HTTP Secure / RC4 / Cryptographic protocols / Secure communication / Internet protocols

This POODLE Bites: Exploiting The  SSL 3.0 Fallback  Security Advisory  Bodo Möller, Thai Duong, Krzysztof Kotowicz  Google  September 2014 

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2014-10-16 15:05:34
848Computer security / Crime prevention / National security / Secure communication / Public safety / Computer network security / Electronic commerce / Security

Uttar Pradesh Co-operative Bank makes Network Access Safer and Faster with Seqrite Endpoint Security ORGANIZATION PROFILE Website:

Add to Reading List

Source URL: bitcast-b.bitgravity.com

Language: English - Date: 2015-04-06 03:26:57
849Public-key cryptography / Password authentication protocol / Key-agreement protocol / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Encrypted key exchange

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-13 20:50:57
850Amateur radio / D-STAR / Application server / Operating system / Server / HTTP Secure / Malware / Computing / Network architecture / HTTP / Cryptographic protocols / Secure communication

Securing Distributed Systems with Information Flow Control Nickolai Zeldovich, Silas Boyd-Wickizer, and David Mazi`eres Stanford University A BSTRACT Web

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2008-02-22 21:15:03
UPDATE