Transport Layer Security

Results: 1523



#Item
21An Anatomy of Mobile Web Performance over Multipath TCP Bo Han Feng Qian∗ Shuai Hao Lusheng Ji

An Anatomy of Mobile Web Performance over Multipath TCP Bo Han Feng Qian∗ Shuai Hao Lusheng Ji

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-12-02 16:47:09
22StartCom Certification Authority Policy & Practice Statements Version: Status: Updated:

StartCom Certification Authority Policy & Practice Statements Version: Status: Updated:

Add to Reading List

Source URL: www.startssl.com

Language: English - Date: 2015-11-26 02:27:34
23Ricochet Security Assessment Ricochet February 15, 2016 – Version 1.2 Prepared for John Brooks

Ricochet Security Assessment Ricochet February 15, 2016 – Version 1.2 Prepared for John Brooks

Add to Reading List

Source URL: penetrationstest.se

Language: English - Date: 2016-04-11 13:49:12
24DutchGrid Certification Authorities DutchGrid and NIKHEF Medium-security X.509

DutchGrid Certification Authorities DutchGrid and NIKHEF Medium-security X.509

Add to Reading List

Source URL: certificate.nikhef.nl

Language: English - Date: 2006-07-27 08:52:10
25Developing teaching material for formal modeling of security protocols Daming Chen and Michael Huth Overview •

Developing teaching material for formal modeling of security protocols Daming Chen and Michael Huth Overview •

Add to Reading List

Source URL: www.dcddcc.com

Language: English - Date: 2016-08-05 04:38:12
26The TCPProxy Table of contents 1 Starting the TCPProxy..................................................................................................2 2 Preparing the Browser...........................................

The TCPProxy Table of contents 1 Starting the TCPProxy..................................................................................................2 2 Preparing the Browser...........................................

Add to Reading List

Source URL: grinder.sourceforge.net

Language: English - Date: 2014-05-20 07:02:06
27plug´n´trust  plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2011-01-27 05:18:57
28ALOHA LOAD BALANCER MANAGING SSL – CHAINED CERTIFICATES “APPNOTE” #0024 ― MANAGING SSL — CHAINED CERTIFICATES This application note is intended to help you implement SSL management via chained certificates with

ALOHA LOAD BALANCER MANAGING SSL – CHAINED CERTIFICATES “APPNOTE” #0024 ― MANAGING SSL — CHAINED CERTIFICATES This application note is intended to help you implement SSL management via chained certificates with

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:52:21
29Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate policy / Public key certificate / Certificate authority / X.509 / Revocation list / Energy Sciences Network / Root certificate

DOE Science Grid PKI Certificate Policy And Certification Practice Statement

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2003-02-19 17:44:10
30SafeBreach Stop tomorrow’s breach. Today. In Plain Sight: The Perfect Exfiltration

SafeBreach Stop tomorrow’s breach. Today. In Plain Sight: The Perfect Exfiltration

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2016-05-27 09:10:01