Transport Layer Security

Results: 1523



#Item
551Cryptographic software / Secure communication / Computing / Internet / Internet standards / Cipher suite / Transport Layer Security / Camellia / MatrixSSL / Cryptography / Cryptographic protocols / Internet protocols

  CycloneSSL is a lightweight SSL/TLS implementation targeted for use by embedded application developers. It

Add to Reading List

Source URL: www.oryx-embedded.com

Language: English - Date: 2015-01-25 07:33:55
552Internet protocols / Data / Secure communication / Public-key cryptography / Internet standards / Transport Layer Security / Cipher suite / HTTP Secure / GnuTLS / Cryptography / Cryptographic protocols / Computing

It Is Time to Redesign Transport Layer Security Francisco Corella, PhD Karen Lewison, MD

Add to Reading List

Source URL: pomcor.com

Language: English - Date: 2014-01-12 22:33:51
553Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Man-in-the-middle attack / Cryptographic hash function / X.509 / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-04 16:50:19
554Cryptography / Data / Computing / Internet standards / Cipher suite / Transport Layer Security / TLS-PSK / Public-key cryptography / HTTP Secure / Cryptographic protocols / Internet protocols / Secure communication

1 DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose Luis

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 07:49:31
555Data / Information / Secure communication / Internet standards / Electronic commerce / Transport Layer Security / Authentication protocol / Cipher suite / Password authentication protocol / Cryptographic protocols / Cryptography / Internet protocols

Generic Compilers for Authenticated Key Exchange∗ Tibor Jager Florian Kohlar Sven Sch¨age

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-02 08:15:58
556Data / Secure communication / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / WS-Security / WS-SecureConversation / Cipher suite / Cryptography / Computing / Cryptographic protocols

Appears in C. Pautasso, T. Gschwind (Eds.): 2nd ECOWS Workshop on Emerging Web Services Technology – WEWST 2007, CEUR Workshop Proceedings (CEUR-WS.org) Vol-313, ISSN, 2008. SSL-over-SOAP: Towards a Token-bas

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-01-13 08:10:17
557Key management / Cryptographic protocols / Passphrase / Password / PBKDF2 / Crypt / Key / Transport Layer Security / Encrypting File System / Cryptography / Cryptographic software / Disk encryption

High Security Online Backup A Cyphertite White Paper February, 2013 Cryptography

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-03-25 09:52:17
558Network architecture / Internet / Internet standards / Electronic commerce / Transport Layer Security / HTTP Secure / Load balancing / Windows / HOB GmbH & Co KG / Computing / Cryptographic protocols / Secure communication

HOB GmbH & Co. KG SchwadermühlstrCadolzburg Tel: Fax: E-Mail:

Add to Reading List

Source URL: www.hobsoft.com

Language: English - Date: 2010-03-30 08:42:59
559Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Man-in-the-middle attack / Cryptographic hash function / X.509 / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-04 16:50:19
560Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Man-in-the-middle attack / Public-key cryptography / Password / Cryptography / Secure communication / Cryptographic protocols

Thou Shalt not Leak your Keys: Practical Key Privilege Separation Using Caml Crush M. DAUBIGNARD

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-01 08:17:00
UPDATE