Secure communication

Results: 3134



#Item
81Revisiting Circuit Clogging Attacks on Tor Eric Chan-Tin, Jiyoung Shin and Jiangmin Yu Department of Computer Science Oklahoma State University {chantin, jiyoung, jiangmy}@cs.okstate.edu Abstract—Tor is a popular anony

Revisiting Circuit Clogging Attacks on Tor Eric Chan-Tin, Jiyoung Shin and Jiangmin Yu Department of Computer Science Oklahoma State University {chantin, jiyoung, jiangmy}@cs.okstate.edu Abstract—Tor is a popular anony

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2013-11-08 14:52:20
82Microsoft Word - IBSS&K Engineering.doc

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:10
83Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
84Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
85eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1  Institute for Internet Security, University of Applied Sciences Gelsenkirchen

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
86KYLE GRAHAM SCHOMP 364 Riverway, #26 Boston, MA5473 https://kyle.schomp.info/

KYLE GRAHAM SCHOMP 364 Riverway, #26 Boston, MA5473 https://kyle.schomp.info/

Add to Reading List

Source URL: kyle.schomp.info

Language: English - Date: 2016-05-31 23:40:45
872016 Data Breach Investigations Report 89% of breaches had a financial or espionage motive.

2016 Data Breach Investigations Report 89% of breaches had a financial or espionage motive.

Add to Reading List

Source URL: regmedia.co.uk

Language: English - Date: 2016-05-12 01:27:36
88Dutch Data Protection Authority  The data breach notification obligation as laid down in the Dutch Data Protection Act Policy rules for the application of article 34a under the Dutch Data Protection Act

Dutch Data Protection Authority The data breach notification obligation as laid down in the Dutch Data Protection Act Policy rules for the application of article 34a under the Dutch Data Protection Act

Add to Reading List

Source URL: autoriteitpersoonsgegevens.nl

Language: English - Date: 2016-03-01 12:36:54
89Computing / Internet / E-commerce / Internet security / Secure communication / Transport Layer Security / Payment Card Industry Data Security Standard / POODLE / SSL acceleration

DOCX Document

Add to Reading List

Source URL: 3fup3p2pb35f2iroyz2x2mre.wpengine.netdna-cdn.com

Language: English - Date: 2016-04-06 08:04:41
90FME® Server Security  Table of Contents FME Server Authentication - Access Control

FME® Server Security Table of Contents FME Server Authentication - Access Control

Add to Reading List

Source URL: cdn.safe.com

Language: English - Date: 2015-07-30 16:36:24