Transport Layer Security

Results: 1523



#Item
431Computer networking / Transmission Control Protocol / Server / Client–server model / Transport Layer Security / Real Time Messaging Protocol / Computing / Network architecture / Network protocols

The SOAR Communications Library New (SCLN) Introduction. The SOAR Communications Library New (SCLN) provides a set of LabVIEW VIs for implementing TCP/IP connections in a client-server applications environment. Multiple

Add to Reading List

Source URL: www.ctio.noao.edu

Language: English - Date: 2005-06-09 16:04:39
432Secure communication / Internet / Data / Internet protocols / Internet standards / Transport Layer Security / Security Assertion Markup Language / Password / SAML 2.0 / Computing / Teleconferencing / Cryptographic protocols

Zoom Security White Paper May 2013 Zoom offers the first Unified Meeting Experience (UMX), a cloud service that provides a 3-in-1 meeting platform with HD video conferencing, mobility and web meetings. UMX also offers th

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-04-13 09:04:08
433Identity management systems / Identity management / Security Assertion Markup Language / Electronic commerce / Cryptographic protocols / Public-key cryptography / WS-Security / XML Signature / Transport Layer Security / Computing / Cryptography / System software

Interface specifications EID SCHEME Version:

Add to Reading List

Source URL: www.eid-stelsel.nl

Language: English - Date: 2014-12-03 06:13:42
434Computing / Cryptographic protocols / Datagram Transport Layer Security / Middlebox / Spud / Protocol stack / Communications protocol / Data / Information / Internet protocols

Substrate Protocol for User Datagrams (SPUD) Status Joe Hildebrand

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-03-23 11:03:18
435Security / Cyberwarfare / Electronic commerce / Transport Layer Security / Vulnerability / HTTP Secure / Cryptographic protocols / Secure communication / Computing

SSLv3 POODLE Vulnerability Frequently Asked Questions Over the last week, the info-security and IT communities exploded about the SSL POODLE vulnerability. We expect that over the course of the next few weeks you will b

Add to Reading List

Source URL: security.radware.com

Language: English - Date: 2014-10-15 17:25:36
436Internet standards / Internet protocols / Cryptographic protocols / Secure communication / Public-key cryptography / Transmission Control Protocol / Lightweight Directory Access Protocol / Transport Layer Security / Certificate authority / Cryptography / Computing / Internet

SSL Protocol The Transmission Control Protocol/Internet Protocol (TCP/IP) governs the transport and routing of data over the Internet. Other protocols, such as the Hypertext Transport Protocol (HTTP), Lightweight Directo

Add to Reading List

Source URL: www.cryptoheaven.com

Language: English - Date: 2011-03-01 12:16:22
437Internet / Transport Layer Security / Customer service / Computing / Business / Electronic commerce / Internet standards / Online shopping

Pricing Policy All of our prices are in Australian dollars (AUD) and include GST (Goods and services tax). Refund Policy If you can’t attend a course due to unplanned events, you can send someone else from your service

Add to Reading List

Source URL: www.cscentral.org.au

Language: English - Date: 2011-08-11 22:25:37
438Computing / Internet protocols / Security / Internet standards / Transport Layer Security / Cipher suite / HTTP Secure / Public-key cryptography / Key / Cryptography / Secure communication / Cryptographic protocols

SSL and TLS An Overview of A Secure Communications Protocol Simon Horman aka Horms

Add to Reading List

Source URL: horms.net

Language: English - Date: 2005-04-17 17:27:10
439Internet protocols / Internet standards / Multihoming / Stream Control Transmission Protocol / Streaming / Computer network security / Transport layer / Transmission Control Protocol / Firewall / Network architecture / Internet / Computing

Basic Protocols 25 Figure 2.3: These are phase diagrams of the sequence number generators for four operating systems. The lower right shows a correct implementation of RFC 1948 sequence number generation (by FreeBSD 4.6

Add to Reading List

Source URL: www.wilyhacker.com

Language: English - Date: 2004-11-16 15:11:46
440Computing / Network architecture / Secure communication / Cryptographic protocols / Electronic commerce / Transport Layer Security / Transmission Control Protocol / Lightweight Directory Access Protocol / Cipher suite / Internet protocols / Internet standards / Internet

Network Working Group Request for Comments: 4681 Updates: 4346 Category: Standards Track S. Santesson

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2006-10-10 19:17:44
UPDATE