Transport Layer Security

Results: 1523



#Item
581Computing / Internet / Internet standards / Secure communication / Electronic commerce / Transport Layer Security / Cipher suite / STARTTLS / RC4 / Internet protocols / Cryptography / Cryptographic protocols

Internet Engineering Task Force (IETF) Request for Comments: 7457 Category: Informational ISSN: Y. Sheffer

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-02-05 18:10:11
582Cryptographic protocols / Electronic commerce / Internet protocols / Internet standards / Secure communication / OCaml / Transport Layer Security / JavaScript / Caml / Computing / Software engineering / Computer programming

Antoine Delignat-Lavaud Personal Information Born in 1987, French citizenship Email:

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2015-02-09 15:04:18
583Security / Secure communication / Internet standards / Computer network security / Transport Layer Security / Password / Public-key cryptography / HTTP Secure / Session hijacking / Cryptography / Cryptographic protocols / Computing

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal1 , Karthikeyan Bhargavan2, Antoine Delignat-Lavaud2 , and Sergio Maffeis3, 1

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2013-01-25 08:24:32
584Internet / Internet protocols / Network protocols / Cryptographic protocols / Server Message Block / NetBIOS / Lightweight Directory Access Protocol / Stream Control Transmission Protocol / Transport Layer Security / Computing / Internet standards / Network architecture

vulnerabilities die hard http://labs.musecurity.com i see dead protocols

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-12 15:35:33
585Network architecture / Secure communication / Internet standards / Cryptographic protocols / Electronic commerce / Transport Layer Security / Server Name Indication / Cipher suite / MIME / Computing / Internet / Internet protocols

Network Working Group Request for Comments: 4366 Obsoletes: 3546 Updates: 4346 Category: Standards Track

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-06-18 12:38:53
586System software / GO-Global / Remote Desktop Services / Transport Layer Security / Proxy server / Microsoft Windows / Comparison of remote desktop software / Remote Desktop Protocol / Computing / Remote desktop / Software

GO-GLOBAL for Windows Host Administrator Guide 4.8.2 COPYRIGHT AND TRADEMARK NOTICE

Add to Reading List

Source URL: www.graphon.com

Language: English - Date: 2015-01-26 13:54:06
587Email / Internet standards / Internet privacy / Public-key cryptography / S/MIME / Email encryption / Transport Layer Security / Pretty Good Privacy / Email client / Computing / Internet / Cryptography

BizTech home | about | subscribe to digital edition | partner advertising | back issues | feedback | contact login | register [ ROI [ wireless [ finance [ IT investment [ profiles [ security [ networking [ telecommuting

Add to Reading List

Source URL: www.dslextreme.com

Language: English - Date: 2012-06-09 03:29:38
588Computing / Credit cards / Computer law / Business / Payment Card Industry Data Security Standard / PA-DSS / Money / Transport Layer Security / Conventional PCI / Payment systems / Electronic commerce / Data privacy

PCI SSC FAQ on impending revisions to PCI DSS, PA-DSS to address SSL protocol vulnerability 25 March 2015 *Note: This document provides additional information to support the “PCI SSC bulletin on impending revisions to

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-03-26 17:39:51
589Public-key cryptography / Cryptographic protocols / Electronic commerce / HTTP / HTTP Secure / IBM / Proxy server / Public key certificate / Transport Layer Security / Cryptography / Computing / Secure communication

Turning wine back into water: Building strategic decisions from the ground up using disaggregated institutional data requires effective processes and IT Julie Arthur and Naomi Doncaster AAIR, November 2009

Add to Reading List

Source URL: www.aair.org.au

Language: English - Date: 2010-11-29 03:37:15
590Public-key cryptography / Cryptographic protocols / Electronic commerce / HTTP / HTTP Secure / IBM / Proxy server / Public key certificate / Transport Layer Security / Cryptography / Computing / Secure communication

Safe Surfing: How to Build a Secure World Wide Web Connection SG24

Add to Reading List

Source URL: www.redbooks.ibm.com

Language: English - Date: 1998-11-10 02:09:07
UPDATE