Transport Layer Security

Results: 1523



#Item
561Identity management / Computing / Identity / Shibboleth / Security Assertion Markup Language / Identity management system / Transport Layer Security / Service provider / Athens / Federated identity / Internet standards / Computer security

Microsoft Word - Hinweise fuer Verhandler und Anbieter en.doc

Add to Reading List

Source URL: www.konsortium-bw.de

Language: English - Date: 2010-05-15 10:52:05
562Block cipher modes of operation / Block cipher / Ciphertext / Transport Layer Security / Padding oracle attack / Plaintext / Cryptography / Chosen-plaintext attack / Initialization vector

A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-03-05 14:25:50
563Networking hardware / Modems / Logical Link Control / Out-of-band management / Terminal server / Serial port / Transport Layer Security / Dial-up Internet access / Remote administration / Computing / Internet / OSI protocols

NetModem™ Modem Pooling Software Product Data Sheet

Add to Reading List

Source URL: pcmicro.com

Language: English - Date: 2009-05-25 12:21:56
564Security / Media technology / Digital cinema / Crime prevention / National security / Digital Cinema Package / Computer security / Transport Layer Security / Technology / Digital media / Electronic commerce / Secure communication

Digital Cinema System Specification v.1.2

Add to Reading List

Source URL: dcimovies.com

Language: English - Date: 2014-09-17 20:12:24
565Diffie–Hellman key exchange / Learning with errors / XTR / Onion routing / Homomorphic encryption / Transport Layer Security / RSA / Cryptography / Cryptographic protocols / Electronic commerce

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:34:21
566Cross-site scripting / HTTP cookie / Application security / JavaScript / Hypertext Transfer Protocol / Session / Application server / Transport Layer Security / Digest access authentication / Computing / HTTP / Computer security

Developing Secure Web Applications White Paper Izhar Bar-Gad Amit Klein

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-11-02 16:08:47
567Secure communication / Computing / Internet standards / Server Name Indication / Web hosting / Domain Name System Security Extensions / Transport Layer Security / Internet protocols / Internet / Cryptography

Encrypted SNI file:///Users/spt/ietf-90-tls/encrypted-sni.html Encrypted SNI

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2014-07-20 10:10:31
568News aggregators / Secure communication / Internet / Hypertext / Internet Explorer / Proprietary software / Transport Layer Security / Software / Computing / FTP clients

How  to  Enable  TLS  v1.0  in  Microsoft  Internet  Explorer  6   and  disable  SSL  v2  and  v3     (Please note – you should really upgrade to a newer version of I

Add to Reading List

Source URL: www.ccnow.com

Language: English - Date: 2014-10-22 21:11:51
569Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: nerdoholic.org

Language: English - Date: 2013-02-18 19:54:05
570Secure communication / Security / Internet protocols / Internet standards / HTTP / Transport Layer Security / HTTP Secure / Password / Secure Remote Password protocol / Cryptography / Cryptographic protocols / Computing

Crypton: Zero-Knowledge Application Framework Cam Pedersen David Dahl Engineer, Crypton

Add to Reading List

Source URL: crypton.io

Language: English - Date: 2014-11-11 16:05:14
UPDATE