Transport Layer Security

Results: 1523



#Item
961Computer security / Computer network security / Internet protocols / National security / Information security / Transport Layer Security / OAuth / Internet security / Access token / Security / Computing / Electronic commerce

Clever Security Overview Clever Security White Paper ___________________________________________________________________________

Add to Reading List

Source URL: assets.clever.com

Language: English - Date: 2014-11-25 20:24:17
962Windows NT / Hacking / Software testing / Vulnerability / Transport Layer Security / Security Support Provider Interface / Windows / Exploit / Windows Metafile vulnerability / Computing / Microsoft Windows / Computer security

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-11-12 18:22:53
963Internet protocols / Cryptographic software / Cryptographic protocols / Secure communication / Internet standards / Password / OpenSSL / Transport Layer Security / Vulnerability / Computing / Computer security / Cyberwarfare

Microsoft Word - Heartbleed_April_2014.docx

Add to Reading List

Source URL: www.oipc.ab.ca

Language: English - Date: 2014-04-14 15:13:41
964Public-key cryptography / Secure communication / Cryptographic software / Extensible Messaging and Presence Protocol / HTTP Secure / Opportunistic encryption / X.509 / Transport Layer Security / Simple Mail Transfer Protocol / Cryptography / Computing / Cryptographic protocols

File: /tmp/hosts-2.txt IS IT TIME TO BRING BACK THE HOSTS FILE? INELEGANT ENCRYPTION SOLUTIONS FOR AN INELEGANT NETWORK? Peter Eckersley, Technology Projects Director Electronic Frontier Foundation

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
965Secure communication / Electronic commerce / Key management / Public-key cryptography / Cryptographic software / Transport Layer Security / Certificate authority / Public key certificate / Vulnerability / Cryptography / Computing / Security

The Matter of Heartbleed *Zakir Durumeric1 , James Kasten1 , David Adrian1 , J. Alex Halderman1 , Michael Bailey1,2 2

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-09-18 14:11:15
966Espionage / Internet privacy / Secure communication / Internet standards / Email / Transport Layer Security / Traffic analysis / Steganography / Tor / Internet / Computing / Cryptographic protocols

Monitoring message size to break privacy Current issues and proposed solutions Alfredo Pironti INRIA Paris-Rocquencourt, Paris, France [removed] January 15, 2014

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
967Public-key cryptography / Electronic commerce / Secure communication / Access control / X.509 / Public key certificate / HTTP Secure / X.500 / Transport Layer Security / Cryptography / Security / Cryptographic protocols

Smart Certi cates: Extending X.509 for Secure Attribute Services on the Web Joon S. Park and Ravi Sandhu The Laboratory for Information Security Technology Information and Software Engineering Department George Mason Uni

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
968Internet / Internet protocols / Internet standards / Secure communication / Public-key cryptography / Transport Layer Security / Extensible Messaging and Presence Protocol / Internet security / Vulnerability / Computing / Cryptography / Cryptographic protocols

Improving Security on the Internet (with improved Collaboration) Hannes Tschofenig [removed] Abstract Securing the Internet has been an on-going activity since the early days of the IETF and a variety of

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-03-10 16:49:33
969Secure communication / Web hosting / HTTP / Internet protocols / Cryptographic protocols / Transport Layer Security / Server Name Indication / Virtual hosting / HTTP Secure / Computing / Internet / World Wide Web

Virtual Host Confusion: Weaknesses and Exploits Black Hat 2014 Report* Antoine Delignat-Lavaud Karthikeyan Bhargavan

Add to Reading List

Source URL: bh.ht.vc

Language: English - Date: 2014-08-28 08:51:54
970Data / Secure communication / Internet protocols / Computer network security / HTTP / HTTP Secure / Opportunistic encryption / Transport Layer Security / Cryptographic protocols / Computing / Cryptography

Trust  Issues  with  Opportunistic  Encryption   Scott  Rose,  Stephen  Nightingale,  Doug  Montgomery   {scottr,  night,  [removed]}   National  Institute  of  Sta

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
UPDATE