SPORE, the Security Protocols Open Repository, is an online library of security protocols with comments and links to papers. Each protocol is downloadable...
2 KB (167 words) - 14:27, 28 February 2025
Point Protocol Secure Shell (SSH) Signal Protocol Transport Layer Security ZRTP List of cryptosystems Secure channel Security Protocols Open Repository Comparison...
9 KB (1,015 words) - 07:59, 25 April 2025
Anthropic in November 2024 as an open standard for connecting AI assistants to data systems such as content repositories, business management tools, and...
18 KB (1,684 words) - 15:17, 16 June 2025
the OpenSSL encryption library extensively, as well as the TLS protocol, and contains many security and control features. It uses a custom security protocol...
23 KB (2,066 words) - 02:28, 4 May 2025
Needham. "A Logic of Authentication". ACM Transactions on Computer Systems 8 (1990), pp. 18–36. Wide Mouthed Frog, Security Protocols Open Repository...
3 KB (427 words) - 17:34, 2 March 2025
Spore (agricultural publication), a magazine published by CTA Security Protocols Open Repository S'pore, common popular abbreviation for Singapore Spore (Phrygia)...
1 KB (210 words) - 02:45, 12 August 2022
Decentralized networks using protocols such as DSNP can implicitly help to enable increased user anonymity, thus enhancing a user's security and privacy. It allows...
4 KB (297 words) - 23:35, 4 June 2025
networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use. NTP was designed by David L. Mills of the University of...
62 KB (6,428 words) - 11:00, 3 June 2025
Information Security Management Act, 2002) compliance. The National Vulnerability Database (NVD) is the U.S. government content repository for SCAP. An...
6 KB (659 words) - 05:49, 25 May 2025
securing protocols within networks, servers, computers, and logical designs to enhance overall security. These guides, when implemented, enhance security for...
2 KB (195 words) - 21:02, 8 April 2025
Open Vulnerability and Assessment Language (OVAL) is an international, information security, community standard to promote open and publicly available...
6 KB (847 words) - 04:11, 9 March 2025
is one of the most common protocols for email retrieval. The Post Office Protocol provides access via an Internet Protocol (IP) network for a user client...
15 KB (1,892 words) - 19:08, 16 May 2025
Free and open-source software portal ModSecurity, sometimes called Modsec, is an open-source web application firewall (WAF). Originally designed as a module...
8 KB (758 words) - 09:59, 10 April 2024
fixed; they recommend the use of more modern protocols like SFTP and rsync for file transfer. As of OpenSSH version 9.0, scp client therefore uses SFTP...
9 KB (993 words) - 21:36, 12 March 2025
Network Security Toolkit (NST) is a Linux-based Live DVD/USB Flash Drive that provides a set of free and open-source computer security and networking tools...
5 KB (372 words) - 18:49, 1 June 2025
many other protocols, it relies solely on the existing security mechanisms for current protocols such as the Transmission Control Protocol (TCP) and UDP...
11 KB (1,477 words) - 11:47, 29 April 2025
(RPKI) Herzberg, Amir; Shulman, Haya (2014). "Retrofitting Security into Network Protocols: The Case of DNSSEC". IEEE Internet Computing. 18 (1). pp. 66–71...
64 KB (7,741 words) - 08:19, 9 March 2025
and in December 2009 released the code under an open-source license and made the protocol an open standard. A SPICE client connection to a remote desktop...
9 KB (841 words) - 10:39, 29 November 2024
advantages to a monorepo over individual repositories: Ease of code reuse Similar functionality or communication protocols can be abstracted into shared libraries...
14 KB (1,334 words) - 18:07, 27 May 2025
stronger EAP protocols such as EAP-FAST, PEAP, or EAP-TLS. EAP Transport Layer Security (EAP-TLS), defined in RFC 5216, is an IETF open standard that...
34 KB (4,172 words) - 20:50, 1 May 2025
suite of programs that serve as alternatives to unencrypted protocols like Telnet and FTP. OpenSSH is integrated into several operating systems, namely Microsoft...
26 KB (2,781 words) - 06:13, 11 June 2025
Resource Public Key Infrastructure (category Routing protocols)
Internet routing protocols to prevent route hijacking and other attacks. In particular, RPKI is used to secure the Border Gateway Protocol (BGP) through...
15 KB (1,675 words) - 01:38, 5 June 2025
largely based on recognized open standards such as the Extensible Messaging and Presence Protocol (XMPP) and Transport Layer Security (TLS). The development...
15 KB (1,308 words) - 08:54, 7 April 2025
Single sign-on (section Security)
Single sign-on protocols are affected. Covert Redirect takes advantage of third-party clients susceptible to cross-site scripting (XSS) or open redirect. In...
20 KB (2,292 words) - 14:47, 25 May 2025
2016). "[ANNOUNCE] wayland-protocols 1.1". wayland-devel (Mailing list). Ådahl, Jonas (23 May 2016). "[ANNOUNCE] wayland-protocols 1.4". wayland-devel (Mailing...
126 KB (9,622 words) - 13:28, 15 June 2025
Git (redirect from Git repository)
and protocols Repositories can be published via Hypertext Transfer Protocol Secure (HTTPS), Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP)...
71 KB (7,254 words) - 19:28, 2 June 2025
List of TCP and UDP port numbers (category Internet protocols)
assignments refer to protocols that were never or are no longer in common use. This article lists port numbers and their associated protocols that have experienced...
320 KB (13,096 words) - 04:31, 16 June 2025
LibreSSL (category Free security software)
LibreSSL is an open-source implementation of the Transport Layer Security (TLS) protocol. The implementation is named after Secure Sockets Layer (SSL)...
27 KB (2,291 words) - 21:24, 12 June 2025
("guacd") that dynamically translates and optimizes native protocols into the Guacamole protocol. The part of Guacamole that a user interacts with is the...
9 KB (636 words) - 18:57, 23 March 2025