Transport Layer Security

Results: 1523



#Item
261Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt / Transport Layer Security / Application security / OWASP

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
262Secure communication / Cryptographic protocols / Internet Standards / Computer network security / Transport Layer Security / HTTPS / OpenSSL / Cipher suite / Handshaking / End-to-end encryption / Middlebox / Extensible Authentication Protocol

Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-07-29 16:55:02
263Cryptography / Public-key cryptography / Key management / Internet protocols / Internet Standards / Cryptographic protocols / Named data networking / Authentication / Domain Name System Security Extensions / Key / Unique key / Transport Layer Security

Schematizing Trust in Named Data Networking Yingdi Yu Alexander Afanasyev UCLA

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:18:57
264Malware / Computer worms / Denial-of-service attacks / SQL Slammer / Warhol worm / Witty / Code Red / Transmission Control Protocol / Transport layer / Computer network security

The Top Speed of Flash Worms Stuart Staniford∗ David Moore† Vern Paxson‡

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:06
265Smartphones / Computer security / Cloud clients / Cryptography / National security / Mobile security / Internet privacy / Privacy / Information security / Android / Threat / Transport Layer Security

Analyzing End-Users’ Knowledge and Feelings Surrounding Smartphone Security and Privacy Lydia Kraus∗ , Tobias Fiebig∗ , Viktor Miruchna∗ , Sebastian M¨oller∗ and Asaf Shabtai† ∗ Technische Universit¨at B

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:46
266Computing / Internet / Network architecture / Internet Standards / Internet protocols / Network protocols / Network booting / Dynamic Host Configuration Protocol / Network service / Universal Plug and Play / Proxy Mobile IPv6 / Transport Layer Security

Defensics_TechSheet_LATEST_25Sept14.indd

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
267Computing / Software testing / Computer security / Security / Codenomicon / Vulnerability / Fuzz testing / Wi-Fi / Transport Layer Security / Bluetooth / Vulnerability management

Defensics Build a More Resilient World KEY DEFENSICS FEATURES: • Next-Gen Fuzzing Technology Utilizes template, generation

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
268Cryptography / Transport Layer Security / Cryptographic protocols / Cryptographic software / Internet protocols / Secure communication / Padding oracle attack / Block cipher mode of operation / Padding / Authenticated encryption / OpenSSL / CRIME

Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

Add to Reading List

Source URL: tls.mbed.org

Language: English - Date: 2016-01-19 07:39:30
269Computing / Internet / Internet privacy / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / Computer access control / HTTP cookie / Proxy server / Transport Layer Security / Email

REEF FAMILY OF COMPANIES WEBSITE PRIVACY POLICY Visitors to the Reef Family of Companies website are not required to provide any personal information. However, to use certain features on this site, you may be asked to pr

Add to Reading List

Source URL: www.reefogc.com

Language: English - Date: 2010-08-20 15:18:56
UPDATE