Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Rescorla, Eric Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  Where did I leave my keys?: Lessons from the Juniper dual EC incident
Checkoway S., Maskiewicz J., Garman C., Fried J., Cohney S., Green M., Heninger N., Weinmann R., Rescorla E., Shacham H. Communications of the ACM 61(11): 148-155, 2018.  Type: Article

Safe networks require reliable operating systems free from security vulnerabilities. Trustworthy routers ought to use dependable cryptographic algorithms to protect data transmitted over insecure networks. But how should effective guid...
...
Dec 27 2018  
  The TLS 1.3 protocol
Eric Rescorla. YouTube, 01:24:08, published on Nov 19, 2015, stanfordonline, https://www.youtube.com/watch?v=grRi-aFrbSE. Type: Video

I love video workshops. I especially love video workshops that are archived. If the materials are sophisticated (this one has some tough stuff!), I can watch until I hit a wall and then take time to reflect or look in a dictionary some...
...
Jul 8 2016  
  SSL and TLS: designing and building secure systems
Rescorla E., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2001. 499 pp.  Type: Book (9780201615982)

The Secure Sockets Layer (SSL) is the most widely deployed security protocol in the world, according to this book’s author. It forms part of most commercial Web browsers and servers, and is used to protect the millions of Web...
...
Apr 19 2002  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy