Transport Layer Security

Results: 1523



#Item
911Computer network security / Common Criteria / Cryptographic protocols / Evaluation Assurance Level / Penetration test / Protection Profile / Transport Layer Security / Security Target / Attachmate / Evaluation / Computer security / Computing

Certification Report NetIQ Access Manager 4.0

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2014-09-19 04:22:03
912Public-key cryptography / Internet protocols / Cryptographic software / Transport Layer Security / HTTP Secure / OpenSSL / Public key certificate / Certificate authority / Cipher suite / Cryptography / Secure communication / Cryptographic protocols

REN-ISAC SECURITY ALERT Muzzling the POODLE (While Cleaning Up Other Related Vulnerabilities, Too) October 22, 2014 To: IT Executives and Security Staff EXECUTIVE SUMMARY There have been many recent security advisories i

Add to Reading List

Source URL: www.ren-isac.net

Language: English - Date: 2014-10-22 14:59:58
913Secure communication / Internet / Data / Internet protocols / Internet standards / Transport Layer Security / Security Assertion Markup Language / Password / SAML 2.0 / Computing / Teleconferencing / Cryptographic protocols

Zoom Security White Paper May 2013 Zoom offers the first Unified Meeting Experience (UMX), a cloud service that provides a 3-in-1 meeting platform with HD video conferencing, mobility and web meetings. UMX also offers th

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-01-19 02:15:03
914Learning with errors / Machine learning / Diffie–Hellman key exchange / Transport Layer Security / XTR / Transmission Control Protocol / Onion routing / RSA / Cryptography / Cryptographic protocols / Electronic commerce

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-06 03:15:24
915Public-key cryptography / Cryptographic software / Secure communication / Transport Layer Security / SHA-2 / Digital signature / Key / IPsec / X.509 / Cryptography / Cryptographic protocols / Internet protocols

Microsoft Word - CSG-01_S_english.DOC

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-25 11:42:22
916Internet / Network architecture / Internet standards / Transmission Control Protocol / Transport layer / Honeypot / User Datagram Protocol / Network intrusion detection system / Denial-of-service attack / Computer network security / Computing / Internet protocols

Honeycomb – Creating Intrusion Detection Signatures Using Honeypots Christian Kreibich, Jon Crowcroft University of Cambridge Computer Laboratory JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom firstname.lastname

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-08 11:55:19
917Cryptographic protocols / Electronic commerce / Certificate authorities / Extended Validation Certificate / DigiCert / X.509 / Public key certificate / Transport Layer Security / Root certificate / Cryptography / Public-key cryptography / Key management

CHOOSING AN SSL CERTIFICATE PRO TIPS: PICKING THE RIGHT

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2013-05-14 16:27:48
918Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
919Cryptographic protocols / URI schemes / Internet protocols / Firefox / Transport Layer Security / HTTP Secure / Internet Explorer / Web browser / About URI scheme / Software / Google Chrome / Secure communication

Microsoft Word - Chestnut Announcement[removed]docx

Add to Reading List

Source URL: wits.idaho.gov

Language: English - Date: 2014-10-21 10:19:38
920Secure communication / Computing / Internet / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / RC4 / Password / Internet protocols / Cryptography / Cryptographic protocols

SSL/TLS Deployment Best Practices

Add to Reading List

Source URL: www.ssllabs.com

Language: English - Date: 2014-12-05 16:38:54
UPDATE