Opportunistic encryption

Results: 30



#Item
21draft-nottingham-http2-encryption-02 - Opportunistic Encryption for HTTP URIs

draft-nottingham-http2-encryption-02 - Opportunistic Encryption for HTTP URIs

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
22Taken from: https://strint.pads.ccc.de/1 (backup at http://kuix.de:9321/p/strint-abstracts ) (updated Feb 27, 16:50 GMT) ============================== 1: Privacy Protected Email Phillip Hallam-Baker https://www.w3.org/2

Taken from: https://strint.pads.ccc.de/1 (backup at http://kuix.de:9321/p/strint-abstracts ) (updated Feb 27, 16:50 GMT) ============================== 1: Privacy Protected Email Phillip Hallam-Baker https://www.w3.org/2

Add to Reading List

Source URL: kuix.de

Language: English - Date: 2014-02-27 11:57:47
23Trust	
  Issues	
  with	
  Opportunistic	
  Encryption	
   Scott	
  Rose,	
  Stephen	
  Nightingale,	
  Doug	
  Montgomery	
   {scottr,	
  night,	
  [removed]}	
   National	
  Institute	
  of	
  Sta

Trust  Issues  with  Opportunistic  Encryption   Scott  Rose,  Stephen  Nightingale,  Doug  Montgomery   {scottr,  night,  [removed]}   National  Institute  of  Sta

Add to Reading List

Source URL: www.had-pilot.com

Language: English - Date: 2014-03-21 15:07:13
24A few thesis regarding privacy and security  Subject: A few thesis regarding privacy and security From: Date: 01/20/2014 10:46 PM To: group-strint-submission@w3.org" title="A few thesis regarding privacy and security Subject: A few thesis regarding privacy and security From: "Andreas Kuckartz" Date: 01/20/2014 10:46 PM To: group-strint-submission@w3.org" class="img-responsive img-polaroid">

A few thesis regarding privacy and security Subject: A few thesis regarding privacy and security From: "Andreas Kuckartz" Date: 01/20/2014 10:46 PM To: group-strint-submission@w3.org

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
25  	
   	
     	
   Is	
  Opportunistic	
  Encryption	
  the	
  Answer?	
  

          Is  Opportunistic  Encryption  the  Answer?  

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
26Opportunistic Keying as a Countermeasure to Pervasive Monitoring Stephen Kent BBN Technologies Abstract This document was prepared as part of the IETF response to concerns about “pervasive monitoring” (PM) [Farrell-p

Opportunistic Keying as a Countermeasure to Pervasive Monitoring Stephen Kent BBN Technologies Abstract This document was prepared as part of the IETF response to concerns about “pervasive monitoring” (PM) [Farrell-p

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
27Cryptography in OpenBSD: An Overview Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos fderaadt,niklas,art,angelos,[removed]

Cryptography in OpenBSD: An Overview Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos fderaadt,niklas,art,angelos,[removed]

Add to Reading List

Source URL: openbsd.org

Language: English - Date: 2004-09-07 00:35:13
28strongSwan The new IKEv2 VPN Solution

strongSwan The new IKEv2 VPN Solution

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2007-05-26 10:12:50
29Advanced Features of Linux strongSwan the OpenSource VPN Solution

Advanced Features of Linux strongSwan the OpenSource VPN Solution

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2006-04-27 10:23:08
30

PDF Document

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2004-09-07 00:35:13