Transport Layer Security

Results: 1523



#Item
181Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Secure communication / Key server / Man-in-the-middle attack / Public key certificate / Certificate authority / Anonymity / HTTPS

Verifying Public Keys without Trust: How Anonymity Can Guarantee Data Integrity Lachlan J. Gunn, Andrew Allison, Derek Abbott arXiv:1602.03316v1 [cs.CR] 10 Feb 2016

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2016-02-10 20:40:16
182Cryptography / Secure communication / Cryptographic hash functions / Cryptographic protocols / Hashing / Transport Layer Security / Collision attack / Cipher suite / MD5 / OpenSSL / SHA-2 / Man-in-the-middle attack

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 07:34:05
183Cryptography / Public key infrastructure / Public-key cryptography / Key management / Cryptographic protocols / Transport Layer Security / Public key certificate / X.509 / DocuSign / Online Certificate Status Protocol / SCVP / Authentication

    DocuSign  Confidential    

Add to Reading List

Source URL: certificates.docusign.com

Language: English - Date: 2014-02-20 15:11:45
184Cryptography / Computing / Software / Hypertext Transfer Protocol / Transport Layer Security / Secure communication / Cryptographic protocols / HTTP Strict Transport Security / HTTP Public Key Pinning / HTTP cookie / HTTPS / Browser security

Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning Michael Kranch Joseph Bonneau

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-07-30 05:47:43
185Secure communication / Cryptographic protocols / Internet Standards / Internet protocols / Internet security / Transport Layer Security / Internet Information Services / Cipher suite / Windows / Security Support Provider Interface / FTPS / Security and safety features new to Windows Vista

Thierry ZOLLER Principal Security Consultant http://www.g-sec.lu G-SEC™ is a vendor independent Luxemburgish led

Add to Reading List

Source URL: www.g-sec.lu

Language: English - Date: 2010-02-16 11:11:06
186Computing / Cryptography / Cryptographic protocols / Internet / Secure communication / Internet protocols / Cryptographic software / Internet Standards / Transport Layer Security / OpenSSL / GnuTLS / Cipher suite

Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 06:14:04
187Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / E-commerce / GlobalSign / Extended Validation Certificate / Certificate authority / Certificate policy / Certification Practice Statement / CA/Browser Forum / Public key certificate

GlobalSign CA Certification Practice Statement Date: 2nd May 2016 Version: v8.1

Add to Reading List

Source URL: www.globalsign.com

Language: English - Date: 2016-05-02 16:27:30
188Key management / Public-key cryptography / Transport Layer Security / Public key infrastructure / Windows Vista / Certificate authority / Windows 8 / Microsoft Windows / Root certificate / XAP / Security and safety features new to Windows Vista / Features new to Windows XP

Static Analysis of Windows Phone Applications Version 1.0, Alexander Marsalek – Executive Summary: The objective of the project was to analyse a number of Windows Phone Apps on

Add to Reading List

Source URL: demo.a-sit.at

Language: English - Date: 2015-11-30 04:49:52
189Computing / Internet / Network architecture / Secure communication / Internet Standards / Internet security / Computer network security / Internet protocols / SoftEther VPN / Tor / HTTPS / Transport Layer Security

Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-09-25 08:38:52
190Cryptography / Key management / Public key infrastructure / Transport Layer Security / Public-key cryptography / Certificate authority / Public key certificate / Root certificate / Extended Validation Certificate / X.509 / Online Certificate Status Protocol / Self-signed certificate

Accountable Key Infrastructure (AKI): ∗ A Proposal for a Public-Key Validation Infrastructure Tiffany Hyun-Jin Kim Lin-Shung Huang Adrian Perrig Collin Jackson Virgil Gligor CyLab / Carnegie Mellon University

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2016-03-11 00:44:59
UPDATE