Transport Layer Security

Results: 1523



#Item
631Certificate authority / Transport Layer Security / Code signing / Public key certificate / Public key infrastructure / Key size / DNS spoofing / Dynamic SSL / Self-signed certificate / Cryptography / Public-key cryptography / Key management

Survivable Key Compromise in Software Update Systems ∗ Justin Samuel UC Berkeley

Add to Reading List

Source URL: isis.poly.edu

Language: English - Date: 2012-09-11 18:21:26
632Unisys / Software / Computer architecture / Transport Layer Security / Computing / Internet standards / Burroughs MCP

AdminSock Enterprise Security Agent AdminSock provides a TCP/IP socket interface between enterprise security administration software and the ClearPath MCP security system. It acts as a security agent for the ClearPath MC

Add to Reading List

Source URL: www.locumsoftware.co.uk

Language: English - Date: 2015-02-02 10:21:06
633Cryptographic protocols / File sharing networks / Internet protocols / Internet standards / Server / Server hardware / Transport Layer Security / Session / Peer-to-peer / Computing / Software / System software

Building Intrusion Tolerant Applications Thomas Wu [removed] Michael Malkin

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:11
634Public key certificate / CA/Browser Forum / Certificate authority / Extended Validation Certificate / X.509 / Transport Layer Security / Revocation list / Certificate policy / European Telecommunications Standards Institute / Cryptography / Key management / Public-key cryptography

TR[removed]V1[removed]Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on ETSI TS[removed]for Issuing Publicly-Trusted TLS/SSL Certificates

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-11-16 08:29:02
635Scripting languages / Cryptographic protocols / Secure communication / Firefox / Google Chrome / JavaScript / Transport Layer Security / Opera / Mobile application development / Software / Web browsers / Portable software

A First Look at Firefox OS Security Daniel DeFreez∗ , Bhargava Shastry† , Hao Chen∗ , Jean-Pierre Seifert† ∗ University of California, Davis {dcdefreez, chen}@ucdavis.edu

Add to Reading List

Source URL: mostconf.org

Language: English - Date: 2014-05-17 09:18:10
636Cryptographic protocols / Internet protocols / Internet standards / Depository Trust & Clearing Corporation / Finance / Transport Layer Security / Secure communication / Financial system / Financial economics

Important Notice The Depository Trust Company B #: [removed]

Add to Reading List

Source URL: dtcc.com

Language: English - Date: 2014-12-24 10:02:54
637Cryptographic protocols / Secure communication / Electronic commerce / DigiNotar / HTTP Secure / Public key certificate / Certificate authority / Transport Layer Security / X.509 / Cryptography / Public-key cryptography / Key management

To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates Johanna Amann1 , Robin Sommer1,3 , Matthias Vallentin2 , Seth Hall1 1 International Computer Science Institute 2 UC Berkeley

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2015-03-07 12:34:01
638Certificate policy / Extended Validation Certificate / Public key certificate / X.509 / Certificate authority / Revocation list / CA/Browser Forum / Transport Layer Security / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Key management

E-Tuğra Certification Practice Statement - Version 3.0

Add to Reading List

Source URL: www.e-tugra.com.tr

Language: English - Date: 2013-09-11 03:13:23
639Secure communication / Internet protocols / RC4 / Transport Layer Security / Weak key / Distinguishing attack / Related-key attack / Cipher suite / Cryptanalysis / Cryptography / Cryptographic protocols / Stream ciphers

Hacker Intelligence Initiative Attacking SSL when using RC4 Breaking SSL with a 13-year-old RC4 Weakness Abstract

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2015-03-25 21:58:39
640Bomgar / Networking hardware / System software / Network architecture / Computer network security / Transport Layer Security / Kerberos / Remote administration software / Remote desktop / Computing

The Bomgar Appliance and CJIS © 2014 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owner

Add to Reading List

Source URL: www.bomgar.com

Language: English - Date: 2014-11-07 15:02:37
UPDATE