Secure Sockets
Chapter 27 Secure Sockets Layer (SSL)
20
Distributed Systems. Security concepts; Cryptographic algorithms; Digital signatures; Authentication; Secure Sockets
23
Cisco IOS Secure Sockets Layer (SSL) VPN Technology Overview
58
Experimenting with an intrusion detection system for encrypted networks
21
IPsec Simplified. Peter J. Welcher. Introduction. Just a Very Wee Bit of Cryptology. First, a couple of personal and company news items:
8
Prentice Hall Fundamentals of WiMAX Feb 2007 pdf
478
A Secure Web based framework for Electronic Design (Invited Paper)
6
Network Application Frameworks Interoperable Virtual Private Networks (VPNs), Directory Services, and Security
62
Analysis on Data Protection in Cloud Computing Using Data categorization Procedure
6
SAC 40 Measures to Protect Domain Registration Services Against Exploitation or Misuse
25
Survey on File Security Using Encryption Technique over Public Cloud Environment
6
Semantic Message Oriented Middleware For Publish/Subscribe Networks
10
Immediate Placement of Implants in Infected Extraction Sockets
5
Efficacy of Sodium Carboxymethyl in Mandibular Extraction Sockets
7
Discharge and infection in retinoblastoma post-enucleation sockets
8
An Enhanced Approach for Three Factor Remote User Authentication in Multi-Server Environment
13
Incidence of Dry Socket Following Extraction of Permanent Teeth in a Dental Teaching Institute, Kulashekharam
91
TFE listener architecture. Matt Klein, Staff Software Engineer Twitter Front End
29
Fundamentals of Symbian OS. Sockets. Copyright Symbian Software Ltd.
56
January 1999, ver. 3 Application Note Burn-in sockets are zero-insertion-force (ZIF) sockets that do not deform a device s leads.
8