Transport Layer Security

Results: 1523



#Item
361X.509 / Public key certificate / Certificate authority / Authorization certificate / Transport Layer Security / Revocation list / Certificate policy / PERMIS / HTTP cookie / Cryptography / Public-key cryptography / Key management

Limited Delegation for Client-Side SSL∗ Nicholas Santos Sean W. Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2007-02-28 19:33:48
362Internet standards / Microsoft Windows / Email / Lightweight Directory Access Protocol / Transport Layer Security / Security and safety features new to Windows Vista / Encrypting File System / Computing / Internet / Internet protocols

AirZip® FileSECURE™ Features Communicate with Confidence™ AirZip FileSECURE offers a range of unparalleled advanced features that make it the most secure choice for securing your sensitive and confidential files and

Add to Reading List

Source URL: www.airzip.com

Language: English - Date: 2010-03-14 04:20:04
363Central processing unit / Coprocessor / Acorn Computers / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / IBM / HTTP cookie / Cryptography / Computing / Computer architecture

Practical server privacy with secure coprocessors by S. W. Smith D. Safford

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:48:27
364Key management / Electronic commerce / Secure communication / Transport Layer Security / X.509 / Certificate authority / Public key certificate / HTTP Secure / RSA / Cryptography / Public-key cryptography / Cryptographic protocols

When Private Keys are Public: Results from the 2008 Debian OpenSSL Vulnerability Scott Yilek Eric Rescorla

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-07 21:20:06
365Internet protocols / Key management / Public-key cryptography / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Key size / Secure Shell / Key / Cryptography / Secure communication / Cryptographic protocols

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography Vipul Gupta, Douglas Stebila∗, Stephen Fung* , Sheueling Chang Shantz, Nils Gura, Hans Eberle Sun Microsystems, IncCasey Avenue

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:42
366Certificate authority / Transport Layer Security / Code signing / Public key certificate / Public key infrastructure / Key size / DNS spoofing / Dynamic SSL / Self-signed certificate / Cryptography / Public-key cryptography / Key management

Survivable Key Compromise in Software Update Systems ∗ Justin Samuel UC Berkeley

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2010-08-18 22:10:28
367Qualys / Internet / Network architecture / Electronic commerce / HTTP / Transport Layer Security / HTTP Secure / Application programming interface / Password / Computing / Cryptographic protocols / Secure communication

Qualys SSL Labs Terms of Use v2.2 ! By accessing, browsing or using this website, and/or downloading any of its software, content or information, you acknowledge that you have read, understand and agree to be bound by t

Add to Reading List

Source URL: dev.ssllabs.com

Language: English - Date: 2015-05-17 07:50:02
368Online chat / Computer-mediated communication / Internet protocols / Transport Layer Security / Presence information / XML namespace / BOSH / Computing / Cross-platform software / Extensible Messaging and Presence Protocol

XEP-0198: Stream Management Justin Karneges mailto: xmpp: Peter Saint-Andre

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 13:16:44
369Cyberwarfare / Wireless security / Virtual private network / Network security / Secure Shell / RADIUS / Transport Layer Security / Cisco Systems VPN Client / Kerberos / Computer network security / Computing / Internet

University of Michigan NETWORK WORKING GROUP Recommendation for Wireless Network Security At the University of Michigan

Add to Reading List

Source URL: www.itcom.itd.umich.edu

Language: English - Date: 2007-11-15 14:00:23
370Information / Computer network security / Protected Extensible Authentication Protocol / Windows Server / Extensible Authentication Protocol / IEEE 802.1X / Windows / Authentication protocol / Transport Layer Security / Computing / Wireless networking / Data

Cisco − Cisco Secure ACS for Windows v3.2 With PEAP−MS−CHAPv2 Machine Authentication Table of Contents Cisco Secure ACS for Windows v3.2 With PEAP−MS−CHAPv2 Machine Authentication.......................1 Docum

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:22:41
UPDATE