Transport Layer Security

Results: 1523



#Item
831Cryptographic software / Cryptographic protocols / Internet protocols / Secure communication / RC4 / Stream cipher / Initialization vector / Transport Layer Security / Symmetric-key algorithm / Cryptography / Software / Computing

The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [removed] Abstract. In this report, we point out a serious security flaw in Microsoft Word and Excel. T

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-01-10 07:26:49
832Middleware / Cryptographic protocols / GLite / Storage Resource Manager / Grid computing / European Middleware Initiative / Srm / Grid Security Infrastructure / Transport Layer Security / Computing / Concurrent computing / Computer architecture

MJRA1.5 - Agreement on Common Security Methods for Data Systems

Add to Reading List

Source URL: cds.cern.ch

Language: English - Date: 2011-02-22 04:32:52
833Computer-mediated communication / Post Office Protocol / Transport Layer Security / Message transfer agent / Gmail / Email client / Simple Mail Transfer Protocol / Computing / Email / Internet

If you have Outlook Express Open up Outlook Express From the Menu Bar Tools to Accounts - Click on

Add to Reading List

Source URL: violatel.com

Language: English
834Data / Cryptographic protocols / Secure communication / Computer network security / Transport Layer Security / Transmission Control Protocol / IPsec / Transport layer / Man-in-the-middle attack / Computing / Internet protocols / Network architecture

NETWORK SECURITY EE122 Section 12 QUESTION 1 ABRUPT TERMINATION!

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2013-12-10 23:52:15
835Network architecture / DMZ / Stateful firewall / Network security / Access control list / Cisco ASA / Firewall / Transport Layer Security / File Transfer Protocol / Computer network security / Computing / Internet

Multiple Vulnerabilities in Cisco ASA Jeff Jarmoc, SecureWorks Inc. Black Hat USA 2010 Abstract Firewalls, being among the oldest of security devices, have become somewhat less than

Add to Reading List

Source URL: media.blackhat.com

Language: English
836Computer security / Internet privacy / Crypto-anarchism / Virtual private network / Disaster recovery / Backup / Transport Layer Security / Business continuity planning / Mobile virtual private network / Computer network security / Computing / Network architecture

The Remote Access Imperative in Disaster Recovery Tim Clark, Partner The FactPoint Group May 2006

Add to Reading List

Source URL: entrepreneurship.org

Language: English - Date: 2010-07-23 00:28:07
837System software / Cryptographic protocols / Secure communication / Internet protocols / Internet standards / IFolder / Novell / HTTP Secure / Transport Layer Security / Software / Computing / Novell NetWare

Novell iFolder[removed]Security Administration Guide

Add to Reading List

Source URL: www.novell.com

Language: English - Date: 2014-01-28 12:54:22
838Embedded Linux / Secure communication / Android / Internet protocols / Man-in-the-middle attack / Transport Layer Security / Mobile operating system / Google / Mobile business intelligence / Computing / Smartphones / Software

Android apps are full of potential leaks, finds study

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-03-03 09:57:03
839OSI protocols / Network performance / Flow control / Internet standards / Transmission Control Protocol / Internet protocol suite / Explicit Congestion Notification / TCP congestion avoidance algorithm / Transport layer / Network architecture / Computing / Internet protocols

CPNI TECHNICAL NOTE[removed]SECURITY ASSESSMENT OF THE TRANSMISSION CONTROL PROTOCOL (TCP) FEBRUARY[removed]Disclaimer:

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
840Secure communication / Phishing / Social engineering / Spamming / Firefox / Google Chrome / Transport Layer Security / Malware / Extended Validation Certificate / Software / Portable software / Web browsers

Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Devdatta Akhawe University of California, Berkeley\ast [removed]

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2013-09-13 05:21:46
UPDATE