Transport Layer Security

Results: 1523



#Item
341Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-01-13 10:28:23
342Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2012-01-15 19:52:05
343Internet protocols / Computing / Internet / Cryptographic software / Internet standards / Transport Layer Security / HTTP Secure / Cipher suite / OpenSSL / Cryptography / Secure communication / Cryptographic protocols

Preface You are about to undertake a journey into the mysterious world of cryptography. I’ve just completed mine—writing this book—and it’s been an amazing experience. Although I’d been a user of SSL since its

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-08 18:16:46
344Public-key cryptography / Secure communication / Key management / Transport Layer Security / HTTP Secure / Cipher suite / Public key certificate / Certificate authority / Server Name Indication / Cryptography / Cryptographic protocols / Internet protocols

BULLETPROOF SSL AND TLS Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications Free edition: Getting Started

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-08 18:16:46
345Cyberwarfare / Virtual private network / Internet security / Secure Shell / Transport Layer Security / Cisco Systems VPN Client / UT-VPN / SSL-Explorer: Community Edition / Computer network security / Computing / Computer security

Security Policy for Router

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2011-12-27 05:41:48
346Computing / Internet / Network architecture / Transport Layer Security / Cipher suite / Telex / Proxy server / Transmission Control Protocol / HTTP Secure / Cryptographic protocols / Secure communication / Internet protocols

Telex: Anticensorship in the Network Infrastructure Eric Wustrow∗ ∗ The Scott Wolchok∗

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-07-18 09:40:53
347Secure communication / Computing / Internet / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / RC4 / Password / Internet protocols / Cryptography / Cryptographic protocols

SSL/TLS Deployment Best Practices

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-08 14:35:42
348Cryptography / Computing / Data / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / HTTP Secure / RC4 / Cryptographic protocols / Secure communication / Internet protocols

This POODLE Bites: Exploiting The SSL 3.0 Fallback Page 1

Add to Reading List

Source URL: poodlebleed.com

Language: English - Date: 2014-10-15 00:08:45
349Electronic commerce / Cryptographic protocols / Secure communication / Root certificate / Public key certificate / HTTP Secure / Transport Layer Security / X.509 / Certificate authority / Cryptography / Public-key cryptography / Key management

Understanding Digital Certificates & Secure Sockets Layer

Add to Reading List

Source URL: www.jma.duq.edu

Language: English - Date: 2010-03-11 15:04:34
350Cryptography / Internet protocols / Computer security / Cryptography standards / Tunneling protocols / Transport Layer Security / Secure Shell / Fortinet / FIPS 140-2 / Computing / Computer network security / Cryptographic protocols

FIPSSecurity Policy FortiOS™ 5.0 STATUS ALARM HA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-29 10:54:02
UPDATE