Secure communication

Results: 3134



#Item
901Secure communication / Network architecture / Internet standards / Cryptographic protocols / Transport Layer Security / Server Name Indication / Cipher suite / MIME / Extensible Messaging and Presence Protocol / Computing / Internet / Internet protocols

Network Working Group Request for Comments: 3546 Updates: 2246 Category: Standards Track S. Blake-Wilson

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2003-06-16 13:50:55
902Computing / Network architecture / Cryptographic protocols / Secure communication / Electronic commerce / Transport Layer Security / Transmission Control Protocol / Cipher suite / Lightweight Directory Access Protocol / Internet protocols / Internet standards / Internet

Network Working Group Request for Comments: 4680 Updates: 4346 Category: Standards Track S. Santesson

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2006-10-10 19:17:48
903Cryptographic protocols / Secure communication / HTTP / HTTP Secure / Certificate authority / Public key certificate / Client–server model / Transport Layer Security / FTPS / Cryptography / Key management / Public-key cryptography

Securing Web Servers against Insider Attack Shan Jiang Sean Smith Kazuhiro Minami

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:19
904Cryptographic protocols / Internet / Data / Secure communication / Electronic commerce / Transport Layer Security / Lightweight Directory Access Protocol / X.509 / Null / Computing / Internet protocols / Internet standards

Null Prex Atta ks Against SSL/TLS Certi ates Moxie MarlinspikeAbstra t

Add to Reading List

Source URL: www.thoughtcrime.org

Language: English - Date: 2015-03-19 19:41:06
905Internet / Network architecture / Internet protocols / Internet standards / HTTP / Transport Layer Security / Cipher suite / Stunnel / HTTP Secure / Computing / Cryptographic protocols / Secure communication

SSL splitting: securely serving data from untrusted caches Chris Lesniewski-Laas and M. Frans Kaashoek {ctl,kaashoek}@mit.edu Laboratory for Computer Science Massachusetts Institute of Technology

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:17
906Wireless / Telecommunications engineering / Data security / Secure communication / Wireless intrusion prevention system / Wireless security / Payment Card Industry Data Security Standard / Hotspot / WIPS / Wireless networking / Technology / Computer network security

Wireless LAN (WLAN) infrastructure attacks are today one of the most critical and immediate threats to enterprise networks. To make matters worse, the consumerization of Wi-Fi is flooding enterprises with personal Wi-Fi

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:23:03
907Secure communication / Wireless intrusion prevention system / Electronic engineering / Wireless security / Network access / Wi-Fi / Wireless LAN / IEEE 802.11 / Wireless access point / Wireless networking / Technology / Data security

AirTight Wi-Fi™ is a cost effective, secure and hassle-free wireless LAN (WLAN) solution that is ideal for distributed enterprises with a small IT staff and a limited budget. It offers a next generation intelligent

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:23:03
908United States Department of Homeland Security / Computer network security / Computer security / Secure communication / National security / Public safety / Cyber-security regulation / National Cyber Security Division / Cyberwarfare / Security / Computer crimes

April 16, 2013 Dear Members of the U.S. House of Representatives, The undersigned representatives of the financial services industry are writing in support of H.R. 756, the “Cybersecurity Enhancement Act”; H.R. 967,

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2013-04-18 11:14:54
909Secure communication / Computer network security / Computer security / Electronic commerce / Password / Public safety / Security / Crime prevention / National security

BASDA Software Security – Code of Practice Guide (v1.0) Introduction As BASDA members, we recognise the fundamental importance of secure use of software. Such secure use can be facilitated by the software design but is

Add to Reading List

Source URL: www.basda.org

Language: English - Date: 2013-02-05 05:27:55
910Data management / Microsoft Outlook / Secure messaging / Managed file transfer / IBM Lotus Notes / Accellion /  Inc. / Email / Computing / Computer-mediated communication

Secure and guaranteed email delivery Can you trust that the critical files you email will reach its intended recipient — intact, reliably, and securely? The Cleo Trust solution enables your users to securely communicat

Add to Reading List

Source URL: www.streem.net

Language: English - Date: 2015-02-19 12:16:46
UPDATE