[go: up one dir, main page]

Baker, 2022 - Google Patents

Transport and Encryption

Baker, 2022

Document ID
17844533873788813325
Author
Baker M
Publication year
Publication venue
Secure Web Application Development: A Hands-On Guide with Python and Django

External Links

Snippet

Transport and Encryption | SpringerLink Skip to main content Advertisement Springer Nature Link Account Menu Find a journal Publish with us Track your research Search Cart 1.Home 2.Secure Web Application Development 3.Chapter Transport and Encryption Chapter First …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Ristic Bulletproof SSL and TLS: Understanding and deploying SSL/TLS and PKI to secure servers and web applications
CN110326267B (en) Network security system, method and storage medium with alternative digital certificate
RU2307391C2 (en) Method for remote changing of communication password
US8521821B2 (en) Encrypted email based upon trusted overlays
US20140244998A1 (en) Secure publishing of public-key certificates
KR20060100920A (en) Trusted Third Party Authentication for Web Services
Ristić Bulletproof SSL and TLS
EP3614292A1 (en) File transfer system comprising an upload, storage and download device
Jain Security in computer networks
Schillinger et al. End-to-end encryption schemes for online social networks
WO2016112580A1 (en) Service processing method and device
Gerdes et al. Datagram transport layer security (dtls) profile for authentication and authorization for constrained environments (ace)
Gupta Cryptography and network security
Banoth et al. An introduction to classical and modern cryptography
Kadam et al. Data Storage Security in cloud computing using AES algorithm and MD5 algorithm
Baka et al. SSL/TLS under lock and key: a guide to understanding SSL/TLS cryptography
Baker Transport and Encryption
Rösler et al. Interoperability between messaging services secure–implementation of encryption
Easttom Information assurance/encryption
Téllez et al. Security in mobile payment systems
Easttom SSL/TLS
Siriwardena How Transport Layer Security Works?
Koutny Detecting Unauthorized Modification of HTTP Communication with Steganography
Kandepet An overview of public key infrastructure
Jacobs Providing better confidentiality and authentication on the Internet using Namecoin and MinimaLT