Transport Layer Security

Results: 1523



#Item
981Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Security token / Authentication / Fido / OpenID / Transport Layer Security / Security / Computing / Access control

PDF Document

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-10-20 18:13:20
982Revocation list / Public key certificate / X.509 / Root certificate / Certificate authority / Self-signed certificate / Transport Layer Security / Extended Validation Certificate / HTTP Secure / Cryptography / Public-key cryptography / Key management

Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed Liang Zhang David Choffnes

Add to Reading List

Source URL: www.umiacs.umd.edu

Language: English - Date: 2014-11-07 18:41:40
983Cryptographic protocols / Network architecture / Internet protocols / HTTP / Internet standards / HTTP Secure / SRV record / WebSocket / Transport Layer Security / Internet / Computing / Secure communication

Increasing HTTP Transport Confidentiality with TLS Based Alternate Services Patrick McManus  Mozilla Firefox Networking Module Owner co­author of draft http://tools.ietf.org/html/d

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
984Internet protocols / Firefox / Transport Layer Security / Google Chrome / Software / Secure communication / Cryptographic protocols

Ohio Association of Student Financial Aid Administrators Benefits of using FAFSA-IRS Data Match Retrieval It’s easy! It only takes a couple of extra clicks when completing the FAFSA on the Web to

Add to Reading List

Source URL: www.oasfaa.org

Language: English - Date: 2011-11-30 12:27:00
985Public-key cryptography / Cryptographic protocols / Electronic commerce / Email / National security / X.509 / Public key certificate / Website monitoring / Transport Layer Security / Internet / Computing / Security

End-User Concerns about Pervasive Internet Monitoring: Principles and Practice W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT) 28th February – 1st March 2014, London, UK Tara Whalen

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
986AOL / Netscape / Internet Explorer / Java applet / X Window System / Proxy server / Transport Layer Security / Mac OS X Server / Software / Computing / Internet privacy

Sharing Legacy Data with the Outside World Using JAVELIN ®

Add to Reading List

Source URL: www.minisoft.com

Language: English - Date: 2004-02-06 13:04:50
987Internet / Network architecture / Electronic commerce / Internet protocols / Cryptographic protocols / Transport Layer Security / Load balancing / Application firewall / Hardware security module / Computing / Internet standards / Secure communication

Keyless SSL Retain on-premise custody of SSL private keys with cloud-based DDoS mitigation, CDN, WAF and more Keyless SSL lets sites use CloudFlare for SSL traffic while retaining on-premise

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2014-09-17 20:09:21
988Electronic commerce / Cryptographic protocols / Internet standards / Wireless Transport Layer Security / Wireless Application Protocol / Public key certificate / Certificate authority / Transport Layer Security / Trusted third party / Cryptography / Public-key cryptography / Key management

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Add to Reading List

Source URL: www.entrust.net

Language: English - Date: 2014-11-26 16:25:48
989Payment systems / Cryptographic protocols / Key management / Payment Card Industry Data Security Standard / DigiCert / Transport Layer Security / HTTP Secure / Payment card industry / Credit card / Cryptography / Electronic commerce / Secure communication

Microsoft Word - PCI White Paper EDITS 2010-Jan.docx

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2011-11-28 12:29:29
990Network architecture / Network protocols / Cryptographic protocols / Internet standards / Constrained Application Protocol / Datagram Transport Layer Security / OAuth / JSON / Internet / Computing / Internet protocols / Cloud standards

  Object  Security  in  Web  of  Things     John  Mattsson,  Göran  Selander,  Göran  AP  Eriksson,  Ericsson  Research      

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-05-11 08:39:01
UPDATE