Baker, 2022 - Google Patents
Transport and EncryptionBaker, 2022
- Document ID
- 17844533873788813325
- Author
- Baker M
- Publication year
- Publication venue
- Secure Web Application Development: A Hands-On Guide with Python and Django
External Links
Snippet
Transport and Encryption | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart Book cover
Secure Web Application Development pp 59–93Cite as Apress 1.Home 2.Secure Web …
- 230000004044 response 0 description 29
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fedrecheski et al. | Self-sovereign identity for IoT environments: a perspective | |
Ristic | Bulletproof SSL and TLS: Understanding and deploying SSL/TLS and PKI to secure servers and web applications | |
RU2307391C2 (en) | Method for remote changing of communication password | |
US8521821B2 (en) | Encrypted email based upon trusted overlays | |
US8880877B2 (en) | Method for assembling authorization certificate chains | |
CN110326267B (en) | Network security system, method and storage medium with substitute digital certificate | |
US20140244998A1 (en) | Secure publishing of public-key certificates | |
KR20060100920A (en) | Trusted third party authentication for web services | |
Ristić | Bulletproof SSL and TLS | |
Schillinger et al. | End-to-end encryption schemes for online social networks | |
Jain | Security in Computer Networks | |
Gerdes et al. | Datagram transport layer security (dtls) profile for authentication and authorization for constrained environments (ace) | |
WO2016112580A1 (en) | Service processing method and device | |
KR100984275B1 (en) | Method for generating secure key using certificateless public key in insecure communication channel | |
Banoth et al. | An Introduction to Classical and Modern Cryptography | |
Baker | Transport and Encryption | |
Baka et al. | SSL/TLS under lock and key: a guide to understanding SSL/TLS cryptography | |
Kadam et al. | Data Storage Security in cloud computing using AES algorithm and MD5 algorithm | |
KR20100002424A (en) | Method for generating secure key using certificateless public key | |
Pittoli et al. | Security architectures in constrained environments: A survey | |
Rösler et al. | Interoperability between messaging services secure–implementation of encryption | |
Easttom | SSL/TLS | |
Téllez et al. | Security in mobile payment systems | |
Siriwardena et al. | How Transport Layer Security Works? | |
Koutny | Detecting Unauthorized Modification of HTTP Communication with Steganography |