نتایج جستجو برای: shttp

تعداد نتایج: 5  

Journal: :Mediators of Inflammation 2006
Ulla Jalonen Riina Nieminen Katriina Vuolteenaho Hannu Kankaanranta Eeva Moilanen

In inflammation, the post-transcriptional regulation of transiently expressed genes provides a potential therapeutic target. Tristetraprolin (TTP) is of the factors regulating decay of cytokine mRNAs. The aim of the present study was to identify cytokines whose expression is regulated by TTP. We established a TTP knock-down cell line by expressing shRNA against TTP (shTTP cell line). A cytokine...

ژورنال: :پژوهشنامه پردازش و مدیریت اطلاعات 0
اس.اچ.فُن سلمز

این مقاله تعدادی از پروتکل های امنیتی اینترنت و www را مورد بررسی قرار میدهد. از این میان ssl و shttp تأیید اصالت, محرمانه بودن و یکپارچگی را ارائه میکنند. در حالی که sepp پروتکل پرداخت است, و مخصوصاً برای استفاده در خرید الکترونیکی طراحی شده است.

1995
Don Davis

We show how to use Kerberos to enable its clients to interact securely with non-Kerberized World Wide Web servers. That is, our protocol does not require that the Web server be a member of a Kerberos realm, and also does not rely on time-synchronization between the participants. In our protocol, the Kerberos client uses the Web server's public-key certi cate to gain cryptographic credentials th...

1998
Michael R. M. Jenkin Patrick W. Dymond

Existing security mechanisms for serving documents on the World Wide Web typically require use of either an underlying security transport mechanisms (e.g., SSL) or alternate servers, browsers and data streams (e.g., SHTTP). In this paper we introduce a simpler method using plugins which provides moderate security for serving private documents within the standard HTTP mechanism and socket layer....

2011
Kapil Singh Helen J. Wang Alexander Moshchuk Collin Jackson Wenke Lee

Widespread growth of open wireless hotspots has made it easy to carry out man-in-the-middle attacks and impersonate web sites. Although HTTPS can be used to prevent such attacks, its universal adoption is hindered by its performance cost and its inability to leverage caching at intermediate servers (such as CDN servers and caching proxies) while maintaining end-to-end security. To complement HT...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید