SPORE, the Security Protocols Open Repository, is an online library of security protocols with comments and links to papers. Each protocol is downloadable...
2 KB (167 words) - 14:27, 28 February 2025
Point Protocol Secure Shell (SSH) Signal Protocol Transport Layer Security ZRTP List of cryptosystems Secure channel Security Protocols Open Repository Comparison...
9 KB (1,015 words) - 07:59, 25 April 2025
the OpenSSL encryption library extensively, as well as the TLS protocol, and contains many security and control features. It uses a custom security protocol...
23 KB (2,070 words) - 21:35, 17 June 2025
Spore (agricultural publication), a magazine published by CTA Security Protocols Open Repository S'pore, common popular abbreviation for Singapore Spore (Phrygia)...
1 KB (210 words) - 02:45, 12 August 2022
Anthropic in November 2024 as an open standard for connecting AI assistants to data systems such as content repositories, business management tools, and...
18 KB (1,684 words) - 15:17, 16 June 2025
Needham. "A Logic of Authentication". ACM Transactions on Computer Systems 8 (1990), pp. 18–36. Wide Mouthed Frog, Security Protocols Open Repository...
3 KB (427 words) - 17:34, 2 March 2025
Decentralized networks using protocols such as DSNP can implicitly help to enable increased user anonymity, thus enhancing a user's security and privacy. It allows...
4 KB (297 words) - 23:35, 4 June 2025
networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use. NTP was designed by David L. Mills of the University of...
62 KB (6,428 words) - 11:00, 3 June 2025
Information Security Management Act, 2002) compliance. The National Vulnerability Database (NVD) is the U.S. government content repository for SCAP. An...
6 KB (659 words) - 05:49, 25 May 2025
securing protocols within networks, servers, computers, and logical designs to enhance overall security. These guides, when implemented, enhance security for...
2 KB (195 words) - 21:02, 8 April 2025
is one of the most common protocols for email retrieval. The Post Office Protocol provides access via an Internet Protocol (IP) network for a user client...
15 KB (1,892 words) - 19:08, 16 May 2025
Open Vulnerability and Assessment Language (OVAL) is an international, information security, community standard to promote open and publicly available...
6 KB (847 words) - 04:11, 9 March 2025
Free and open-source software portal ModSecurity, sometimes called Modsec, is an open-source web application firewall (WAF). Originally designed as a module...
8 KB (758 words) - 09:59, 10 April 2024
Network Security Toolkit (NST) is a Linux-based Live DVD/USB Flash Drive that provides a set of free and open-source computer security and networking tools...
5 KB (372 words) - 18:49, 1 June 2025
fixed; they recommend the use of more modern protocols like SFTP and rsync for file transfer. As of OpenSSH version 9.0, scp client therefore uses SFTP...
9 KB (993 words) - 21:36, 12 March 2025
many other protocols, it relies solely on the existing security mechanisms for current protocols such as the Transmission Control Protocol (TCP) and UDP...
11 KB (1,477 words) - 11:47, 29 April 2025
suite of programs that serve as alternatives to unencrypted protocols like Telnet and FTP. OpenSSH is integrated into several operating systems, namely Microsoft...
26 KB (2,781 words) - 06:13, 11 June 2025
stronger EAP protocols such as EAP-FAST, PEAP, or EAP-TLS. EAP Transport Layer Security (EAP-TLS), defined in RFC 5216, is an IETF open standard that...
34 KB (4,172 words) - 20:50, 1 May 2025
largely based on recognized open standards such as the Extensible Messaging and Presence Protocol (XMPP) and Transport Layer Security (TLS). The development...
15 KB (1,308 words) - 08:54, 7 April 2025
advantages to a monorepo over individual repositories: Ease of code reuse Similar functionality or communication protocols can be abstracted into shared libraries...
14 KB (1,334 words) - 18:07, 27 May 2025
Resource Public Key Infrastructure (category Routing protocols)
Internet routing protocols to prevent route hijacking and other attacks. In particular, RPKI is used to secure the Border Gateway Protocol (BGP) through...
15 KB (1,675 words) - 01:38, 5 June 2025
2016). "[ANNOUNCE] wayland-protocols 1.1". wayland-devel (Mailing list). Ådahl, Jonas (23 May 2016). "[ANNOUNCE] wayland-protocols 1.4". wayland-devel (Mailing...
126 KB (9,622 words) - 13:28, 15 June 2025
(RPKI) Herzberg, Amir; Shulman, Haya (2014). "Retrofitting Security into Network Protocols: The Case of DNSSEC". IEEE Internet Computing. 18 (1). pp. 66–71...
64 KB (7,741 words) - 08:19, 9 March 2025
and in December 2009 released the code under an open-source license and made the protocol an open standard. A SPICE client connection to a remote desktop...
9 KB (841 words) - 10:39, 29 November 2024
Single sign-on (section Security)
Single sign-on protocols are affected. Covert Redirect takes advantage of third-party clients susceptible to cross-site scripting (XSS) or open redirect. In...
20 KB (2,292 words) - 14:47, 25 May 2025
("guacd") that dynamically translates and optimizes native protocols into the Guacamole protocol. The part of Guacamole that a user interacts with is the...
9 KB (636 words) - 18:57, 23 March 2025
program for formal verification of cryptographic protocols. It has been used to verify Transport Layer Security 1.3, ISO/IEC 9798, DNP3 Secure Authentication...
8 KB (611 words) - 04:48, 25 May 2025
Z-Wave (category Computer access control protocols)
in this technology are gathered within the Z-Wave Alliance. Like other protocols and systems aimed at the residential, commercial, MDU and building markets...
42 KB (4,750 words) - 12:33, 13 March 2025
WireGuard (category Tunneling protocols)
lighter and better performing than IPsec and OpenVPN, two common tunneling protocols. The WireGuard protocol passes traffic over UDP. In March 2020, the...
23 KB (2,191 words) - 16:14, 25 March 2025