Transport Layer Security

Results: 1523



#Item
531Internet protocols / Computer network security / Network performance / Transmission Control Protocol / Port / Traffic flow / Netflow / Traffic classification / Transport layer / Computing / Data / Network architecture

BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis Konstantina Papagiannaki

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-06-20 08:07:35
532Security / Internet / Cryptographic protocols / Internet standards / Computer security / Wireless security / Encryption / Secure communication / Transport Layer Security / Computing / Internet privacy / Computer network security

The Ethics of Mobile Computing for Lawyers University of Richmond Law School of Law February 27, 2015

Add to Reading List

Source URL: jolt.richmond.edu

Language: English - Date: 2015-03-16 13:24:21
533HTTP / Cryptographic protocols / Internet protocols / Internet standards / Network performance / Representational state transfer / World Wide Web / Reverse proxy / Transport Layer Security / Computing / Internet / Network architecture

RESTful Security Dan Forsberg Nokia Research Center Helsinki, Finland , Abstract— We take a look into the REST architectural style of

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
534Cryptographic protocols / Public-key cryptography / World Wide Web / HTTP / Key management / FOAF / Transport Layer Security / HTTP Secure / X.509 / Computing / Semantic Web / Internet

mod_authn_webid.c, mod_authz_webid.c

Add to Reading List

Source URL: dig.csail.mit.edu

Language: English - Date: 2011-02-01 14:35:35
535Internet standards / Internet protocols / FTP / Cryptographic protocols / Secure communication / Transport Layer Security / File Transfer Protocol / Comparison of FTP client software / HTTP Secure / Computing / Internet / Network architecture

Momentum Systems White Paper: Securing and Integrating File Transfers Over the Internet Securing and Integrating File Transfers Over the Internet

Add to Reading List

Source URL: www.momsys.com

Language: English - Date: 2012-03-26 15:32:48
536Computer network security / Internet protocols / OSI protocols / Transmission Control Protocol / Snort / Network intrusion detection system / Network packet / Transport layer / Traffic flow / Software / Computing / System software

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-23 21:17:18
537Computing / Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
538Secure communication / Key management / Public-key cryptography / Electronic commerce / HTTP Secure / Transport Layer Security / Stunnel / SSL acceleration / Load balancing / Cryptography / Computing / Cryptographic protocols

Recent work in OpenBSD relayd SSL Interception and other Advancements Reyk Floeter () March 2013 Abstract

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2013-04-02 16:02:24
539Internet protocols / Transmission Control Protocol / Packet loss / Retransmission / Transport layer / Packet switching / General Packet Radio Service / Computer network security / TCP reset attack / Computing / Network architecture / Data

Impact of Malicious TCP Retransmission on Cellular Traffic Accounting Younghwan Go, Denis Foo Kune† , Shinae Woo, KyoungSoo Park, and Yongdae Kim KAIST University of Michigan†

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2015-02-24 22:18:59
540Cryptographic protocols / Electronic commerce / Error detection and correction / Public key certificate / X.509 / Root certificate / Transport Layer Security / Hash tree / Digital signature / Cryptography / Public-key cryptography / Key management

Internet Engineering Task Force (IETF) Request for Comments: 6962 Category: Experimental ISSN: B. Laurie

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2013-06-06 16:56:32
UPDATE