The Open-source PKI Book
This document describes Public Key Infrastructures, the PKIX ... of this document can be found at the OSPKI Book WWW site at http://ospkibook.sourceforge.net ...
http://ospkibook.sourceforge.net/
popularity:
pki
security
ssl
opensource
reference
crypto
documentation
openssl
book
cryptography
|
Transport Layer Security - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
security
ssl
tls
cryptography
wikipedia
network
https
protocol
web
wiki
|
root labs rdist
This is possible because Android doesn't place any restrictions on native code ... The only limitation is that the code runs as the app's unprivileged UID, but ...
similarity:
popularity:
security
blog
blogs
crypto
cryptography
linux
software
research
computers
opensource
|
OpenSSL Tricks
It is an extremely useful, valuable Open Source project. When people ... These examples assume that you are using a Unix-like OS, with OpenSSL 0.9.6b or higher. ...
similarity:
popularity:
openssl
ssl
security
linux
tips
encryption
howto
reference
tricks
unix
|
Introduction
NaCl advances the state of the art by improving security, by improving usability, ... NaCl is part of the CACE (Computer Aided Cryptography Engineering) ...
similarity:
popularity:
security
cryptography
crypto
library
programming
encryption
software
network
free
opensource
|
Keyczar
Keyczar: An open source cryptographic toolkit ... Introducing Keyczar ... Keyczar was originally developed by members of the Google Security Team and is ...
similarity:
popularity:
security
python
cryptography
java
programming
opensource
google
software
library
tools
|
opensc-project.org Home of open source smart card solutions
2009 May 7th: OpenSC 0.11.8 with Security Update ... Welcome to opensc-project.org ... OpenSC Project cross compile build environment. ...
similarity:
popularity:
smartcard
security
cryptography
opensource
authentication
linux
opensc
software
crypto
smartcards
|
Wiretapped - Computer Security Software etc.
No information avaiable
similarity:
popularity:
security
hacking
software
tools
networking
internet
linux
network
cryptography
reference
|
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
SANS Institute - Network, Security, Computer, Audit Information & Training
Research and education organization offering computer security training for system and network administrators and security professionals.
similarity:
popularity:
security
training
reference
technology
infosec
internet
computer
news
network
education
|
The Monkeysphere Project
No information avaiable
similarity:
popularity:
ssh
security
pgp
gpg
pki
software
trust
sysadmin
opensource
web
|