Transport Layer Security

Results: 1523



#Item
241Computing / Internet / Internet privacy / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / Network performance / Proxy server / HTTP cookie / Transport Layer Security / Email

REEF FAMILY OF COMPANIES WEBSITE PRIVACY POLICY Visitors to the Reef Family of Companies website are not required to provide any personal information. However, to use certain features on this site, you may be asked to pr

Add to Reading List

Source URL: reefogc.com

Language: English - Date: 2010-08-20 15:18:56
242Computing / Cryptography / Internet / Cryptographic protocols / Internet protocols / Cryptographic software / Secure communication / Transport Layer Security / OpenSSL / Comparison of TLS implementations / Cipher suite / WolfSSL

1 A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche∗ , Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , Cedric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , P

Add to Reading List

Source URL: smacktls.com

Language: English - Date: 2015-03-05 00:10:02
243Cryptography / Public key infrastructure / Key management / Public-key cryptography / E-commerce / Transport Layer Security / DigiCert / CyberTrust / Public key certificate / CA/Browser Forum / X.509 / Online Certificate Status Protocol

Microsoft Word - DigiCert_CPS_v409.doc

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2016-03-04 15:15:05
244Computing / Internet / Network architecture / Network protocols / BID / Transport Layer Security / Comparison of data serialization formats

Netfonds Bank AS API Gateway Version 1.3 Pia Jakobsen 

Add to Reading List

Source URL: www.netfonds.no

Language: English
245Computing / Internet / Network architecture / Secure communication / Internet Standards / Computer network security / Internet protocols / Internet security / SoftEther VPN / Tor / Transport Layer Security / HTTPS

Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-10-05 18:07:52
246Cryptography / Public-key cryptography / Public key infrastructure / Transport Layer Security / Key management / Cryptographic protocols / Public key certificate / X.509 / HTTPS / OpenSSL / Revocation list

Secure Abstraction with Code Capabilities Robbert van Renesse∗ , H˚avard D. Johansen† , Nihar Naigaonkar∗ , and Dag Johansen† ∗ Cornell University, USA † University of Tromsø, Norway Abstract—We propose

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2012-11-08 10:00:02
247Instant messaging clients / Cross-platform software / Videotelephony / Online chat / Cryptography / WhatsApp / End-to-end encryption / Short Message Service / Text messaging / Transport Layer Security / Windows Live Messenger / Instant messaging

BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications Ahmet Talha Ozcan1 , Can Gemicioglu2 , Kaan Onarlioglu3 , Michael Weissbacher3 , Collin Mulliner3 , William Robertson3 , and Engin Kirda3 1

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:32:53
248Cryptography / Transport Layer Security / Secure communication / Finite fields / Cryptographic protocols / Public-key cryptography / Logjam / DiffieHellman key exchange / Index calculus algorithm / XTR / Elliptic curve DiffieHellman / Key size

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: aaspring.com

Language: English - Date: 2015-08-21 16:58:21
249Cryptography / Computing / Internet / Keyword cipher / Password / Obfuscation / Transport Layer Security / Four-square cipher / Classical cipher

AppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps Fangda Cai, Hao Chen Yuanyi Wu

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:56
250Cryptography / Stream ciphers / Cryptographic protocols / RC4 / Internet Standards / Computer network security / Transport Layer Security / Block cipher mode of operation / Keystream / Wi-Fi Protected Access / E0 / Symmetric-key algorithm

A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

Add to Reading List

Source URL: tls.mbed.org

Language: English
UPDATE