• SPORE, the Security Protocols Open Repository, is an online library of security protocols with comments and links to papers. Each protocol is downloadable...
    2 KB (167 words) - 14:27, 28 February 2025
  • Point Protocol Secure Shell (SSH) Signal Protocol Transport Layer Security ZRTP List of cryptosystems Secure channel Security Protocols Open Repository Comparison...
    9 KB (1,015 words) - 07:59, 25 April 2025
  • Thumbnail for Model Context Protocol
    Anthropic in November 2024 as an open standard for connecting AI assistants to data systems such as content repositories, business management tools, and...
    18 KB (1,684 words) - 15:17, 16 June 2025
  • the OpenSSL encryption library extensively, as well as the TLS protocol, and contains many security and control features. It uses a custom security protocol...
    23 KB (2,066 words) - 02:28, 4 May 2025
  • Needham. "A Logic of Authentication". ACM Transactions on Computer Systems 8 (1990), pp. 18–36. Wide Mouthed Frog, Security Protocols Open Repository...
    3 KB (427 words) - 17:34, 2 March 2025
  • Spore (agricultural publication), a magazine published by CTA Security Protocols Open Repository S'pore, common popular abbreviation for Singapore Spore (Phrygia)...
    1 KB (210 words) - 02:45, 12 August 2022
  • Decentralized networks using protocols such as DSNP can implicitly help to enable increased user anonymity, thus enhancing a user's security and privacy. It allows...
    4 KB (297 words) - 23:35, 4 June 2025
  • Thumbnail for Network Time Protocol
    networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use. NTP was designed by David L. Mills of the University of...
    62 KB (6,428 words) - 11:00, 3 June 2025
  • Information Security Management Act, 2002) compliance. The National Vulnerability Database (NVD) is the U.S. government content repository for SCAP. An...
    6 KB (659 words) - 05:49, 25 May 2025
  • securing protocols within networks, servers, computers, and logical designs to enhance overall security. These guides, when implemented, enhance security for...
    2 KB (195 words) - 21:02, 8 April 2025
  • Open Vulnerability and Assessment Language (OVAL) is an international, information security, community standard to promote open and publicly available...
    6 KB (847 words) - 04:11, 9 March 2025
  • Thumbnail for Wireshark
    Wireshark (section Security)
    different networking protocols. It can parse and display the fields, along with their meanings as specified by different networking protocols. Wireshark uses...
    18 KB (1,674 words) - 18:40, 14 April 2025
  • is one of the most common protocols for email retrieval. The Post Office Protocol provides access via an Internet Protocol (IP) network for a user client...
    15 KB (1,892 words) - 19:08, 16 May 2025
  • Free and open-source software portal ModSecurity, sometimes called Modsec, is an open-source web application firewall (WAF). Originally designed as a module...
    8 KB (758 words) - 09:59, 10 April 2024
  • fixed; they recommend the use of more modern protocols like SFTP and rsync for file transfer. As of OpenSSH version 9.0, scp client therefore uses SFTP...
    9 KB (993 words) - 21:36, 12 March 2025
  • Thumbnail for Network Security Toolkit
    Network Security Toolkit (NST) is a Linux-based Live DVD/USB Flash Drive that provides a set of free and open-source computer security and networking tools...
    5 KB (372 words) - 18:49, 1 June 2025
  • many other protocols, it relies solely on the existing security mechanisms for current protocols such as the Transmission Control Protocol (TCP) and UDP...
    11 KB (1,477 words) - 11:47, 29 April 2025
  • (RPKI) Herzberg, Amir; Shulman, Haya (2014). "Retrofitting Security into Network Protocols: The Case of DNSSEC". IEEE Internet Computing. 18 (1). pp. 66–71...
    64 KB (7,741 words) - 08:19, 9 March 2025
  • and in December 2009 released the code under an open-source license and made the protocol an open standard. A SPICE client connection to a remote desktop...
    9 KB (841 words) - 10:39, 29 November 2024
  • advantages to a monorepo over individual repositories: Ease of code reuse Similar functionality or communication protocols can be abstracted into shared libraries...
    14 KB (1,334 words) - 18:07, 27 May 2025
  • stronger EAP protocols such as EAP-FAST, PEAP, or EAP-TLS. EAP Transport Layer Security (EAP-TLS), defined in RFC 5216, is an IETF open standard that...
    34 KB (4,172 words) - 20:50, 1 May 2025
  • suite of programs that serve as alternatives to unencrypted protocols like Telnet and FTP. OpenSSH is integrated into several operating systems, namely Microsoft...
    26 KB (2,781 words) - 06:13, 11 June 2025
  • Resource Public Key Infrastructure (category Routing protocols)
    Internet routing protocols to prevent route hijacking and other attacks. In particular, RPKI is used to secure the Border Gateway Protocol (BGP) through...
    15 KB (1,675 words) - 01:38, 5 June 2025
  • Thumbnail for Conversations (software)
    largely based on recognized open standards such as the Extensible Messaging and Presence Protocol (XMPP) and Transport Layer Security (TLS). The development...
    15 KB (1,308 words) - 08:54, 7 April 2025
  • Thumbnail for Single sign-on
    Single sign-on protocols are affected. Covert Redirect takes advantage of third-party clients susceptible to cross-site scripting (XSS) or open redirect. In...
    20 KB (2,292 words) - 14:47, 25 May 2025
  • Thumbnail for Wayland (protocol)
    2016). "[ANNOUNCE] wayland-protocols 1.1". wayland-devel (Mailing list). Ådahl, Jonas (23 May 2016). "[ANNOUNCE] wayland-protocols 1.4". wayland-devel (Mailing...
    126 KB (9,622 words) - 13:28, 15 June 2025
  • Thumbnail for Git
    Git (redirect from Git repository)
    and protocols Repositories can be published via Hypertext Transfer Protocol Secure (HTTPS), Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP)...
    71 KB (7,254 words) - 19:28, 2 June 2025
  • List of TCP and UDP port numbers (category Internet protocols)
    assignments refer to protocols that were never or are no longer in common use. This article lists port numbers and their associated protocols that have experienced...
    320 KB (13,096 words) - 04:31, 16 June 2025
  • LibreSSL (category Free security software)
    LibreSSL is an open-source implementation of the Transport Layer Security (TLS) protocol. The implementation is named after Secure Sockets Layer (SSL)...
    27 KB (2,291 words) - 21:24, 12 June 2025
  • ("guacd") that dynamically translates and optimizes native protocols into the Guacamole protocol. The part of Guacamole that a user interacts with is the...
    9 KB (636 words) - 18:57, 23 March 2025