2011-4-15
 
Account:
 
Password:
     
Home | E-Business | Technology | Software Engineering | Security | Education | Outsourcing
Technology
Internet of Things/EPC 
Audio Mining & Voice Portal
Pen Computing
Creativity & Innovation
Creativity Techniques 
Semantic Web
Web Intelligence
Adaptive Web
Data Warehouse ...
P2P Computing
Interspace
Digital Game ...
Real-Time Computing
Data Synchronization
Component Framework
Middleware
Multimedia
Product Line ...
Software Mass ...
Embedded Apps ...
Embedded Testing
Real-Time OS
Embedded DB
Programmable DSP
Electronic Design ...
Codesign
Security Technology
DRM
Trends in IT
Artificial Intelligence
Open Source
OLAP/Data Mining
e-Business
AOP
GP
CSCW
Workflow Management
Bioinformatics
DNA Computing
Quantum Computing
HPC
Parallel Computing
Internet
New Tech Resources
Blog
RSS
Wi-Fi
LMDS
Wireless Application
Pervasive Computing
Flexible Transistor
Document Clustering
Document English 
 
 Content
Experts  
Industry Report
Shanghai SPIN  
Services
 Column
Tom Gilb
Q & A
Advanced Inspections
Inspection Economics
Evo Project Management
 
Security Standards & Protocols
 
Secure Electronic Transaction (SET)
http://security.ittoolbox.com/nav/t.asp?t=309&p;=309&h1;=309
http://security.ittoolbox.com/documents/document.asp?i=1363
SET Implementor's Guide
http://security.ittoolbox.com/documents/document.asp?i=1395
Cryptography and SET
http://security.ittoolbox.com/documents/document.asp?i=1358
SET - Ready To Go ?
http://itreports.computerworld.com/data/detail?id=929973662_321&type;=RES&x;=1599575412
Payment Protocols: Cache On Demand
http://security.ittoolbox.com/documents/document.asp?i=1772
eCommerce Payment Systems: SET, SSL, or Another?
http://itreports.computerworld.com/data/detail?id=977265183_252&type;=RES&x;=1816263640
SSH Secure Shell
http://www.ssh.com/products/ssh/index.html
Pretty Good Privacy (PGP)
http://security.ittoolbox.com/nav/t.asp?t=363&p;=363&h1;=363
PGP Encryption
http://security.ittoolbox.com/documents/document.asp?i=1175
Getting Started With PGP
http://security.ittoolbox.com/documents/document.asp?i=1354
Inside PGP Key Reconstruction
http://security.ittoolbox.com/documents/document.asp?i=1165
PGP Integrated into McAfee and Sniffer Business Units
http://www.pgp.com/
Securing Your Enterprise E-Mails With IDs
http://security.ittoolbox.com/documents/document.asp?i=2605
The Protection of Your Secret Key
http://security.ittoolbox.com/documents/document.asp?i=1163
An Integration of PGP and MIME
http://security.ittoolbox.com/documents/document.asp?i=1346
PGP Message Exchange Formats
http://www.imc.org/rfc1991
MIME Security with PGP
http://www.imc.org/rfc2015
Freeware PGP Versions
http://www.pgpi.org/products/pgp/versions/freeware/
End of PGP? Not Likely
http://www.infosecuritymag.com/currentdigest.shtml#news1
OpenPGP Message Formats
http://www.imc.org/rfc2440
Internet Protocol Security (IPsec)
http://security.ittoolbox.com/nav/t.asp?t=387&p;=387&h1;=387
Overview of IPSEC Manageability and Security
http://security.ittoolbox.com/documents/document.asp?i=962
An Introduction to IPsec Encryption
http://security.ittoolbox.com/documents/document.asp?i=929
IPsec and VPNs
http://security.ittoolbox.com/documents/document.asp?i=966
VPN Briefing: Managed VPN Services $250.00
http://itreports.computerworld.com/data/detail?id=1014759516_346&type;=RES&x;=1133424109
EZ-IPSec: Simple, Secure Setup of VPNs
http://itreports.computerworld.com/data/detail?id=1015312503_209&type;=RES&x;=1694496045
IPSec-Based VPNs
http://itreports.computerworld.com/data/detail?id=991168448_785&type;=RES&x;=1749359822
Building and Managing IPSec Extranets
http://itreports.computerworld.com/data/detail?id=1002037064_111&type;=RES&x;=546582161
IP Authentication Header
http://www.ietf.org/rfc/rfc2402.txt
IP Encapsulating Security Payload
http://www.ietf.org/rfc/rfc2406.txt
Next Generation Internet Protocol IPv6
http://playground.sun.com/pub/ipng/html/ipng-main.html
DNSSec (Domain Name System Security Protocol) and BIND9
http://rr.sans.org/unix/BIND9.php
DNSSec and The New BIND Implementation
http://www.nanog.org/mtg-9905/vixie.html
S/MIME and OpenPGP
http://www.imc.org/smime-pgpmime.html
Enhanced Security Services for S/MIME
http://www.imc.org/rfc2634
S/MIME version 3 Message Specification
http://www.ietf.org/rfc/rfc2633.txt
S/MIME Version 3 Certificate Handling
http://www.imc.org/rfc2632
Diffie-Hellman Key Agreement Method
http://www.imc.org/rfc2631
Cryptographic Message Syntax
http://www.imc.org/rfc2630
S/MIME Freeware Library
http://www.imc.org/imc-sfl/index.html
Secure Sockets Layer (SSL)
http://itreports.computerworld.com/data/rlist?t=soft_10_100_66_6
The SSL Protocol Enabling Secure Web Transactions
http://www.itpapers.com/cgi/PSummaryIT.pl?paperid=15246&scid;=179
Secure Networking and FIPS 140-1 Standard
http://itreports.computerworld.com/data/detail?id=1011726116_410&type;=RES&x;=2039089318
Secure Data Center Access: Authentication & Encryption
http://itreports.computerworld.com/data/detail?id=1007580816_654&type;=RES&x;=1814675062
Kerberos
http://security.ittoolbox.com/nav/t.asp?t=388&p;=388&h1;=388
Securing IP Networking Architectures
http://itreports.computerworld.com/data/detail?id=995301383_55&type;=RES&x;=1776583200
Layer 2 Tunneling Protocol (L2TP)
http://security.ittoolbox.com/nav/t.asp?t=389&p;=389&h1;=389
Point-to-Point Tunneling Protocol (PPTP)
http://security.ittoolbox.com/nav/t.asp?t=392&p;=392&h1;=392
Microsoft Windows CE 3.0 Support of PPP and PPTP
http://security.ittoolbox.com/documents/document.asp?i=1241
Understanding PPTP
http://security.ittoolbox.com/documents/document.asp?i=1233
Generic Security Service Application Programming Interface (GSS-API) v2.0
http://www.rfc-editor.org/rfc/rfc2078.txt
XrML: The language for Digital Rights Management
http://itreports.computerworld.com/data/detail?id=990634250_468&type;=RES&x;=1887766406
XrML The Technology Standard for Trusted Systems in the eContent Marketplace
http://itreports.computerworld.com/data/detail?id=990607791_553&type;=RES&x;=833911229
SAML: The Security Assertions Markup Language
http://itreports.computerworld.com/data/detail?id=1013106905_539&type;=RES&x;=824018847
Security Negotiation With WebNFS (IETF Standard Document)
http://itreports.computerworld.com/data/detail?id=985075370_466&type;=RES&x;=1715252095
Considerations For Web Transaction Security (IETF Standard Document)
http://itreports.computerworld.com/data/detail?id=980355540_185&type;=RES&x;=25964620
PGP Links
http://www.pgpi.org/links/
UK IPv6 Resources Center
http://www.cs-ipv6.lancs.ac.uk/
IETF Draft for IPSec
http://www.ietf.org/ids.by.wg/ipsec.html
IETF Draft for IP Security Policy (IPSP)
http://www.ietf.org/ids.by.wg/ipsp.html
IETF Draft for IP Security Remote Access (IPSRA)
http://www.ietf.org/ids.by.wg/ipsra.html
IETF Draft for IPv6
http://www.ietf.org/ids.by.wg/ipv6.html
IETF Draft for Kerberos
http://www.ietf.org/ids.by.wg/krb-wg.html
IETF Draft for L2TP Extensions
http://www.ietf.org/ids.by.wg/l2tpext.html
IETF Draft for Multicast Security (Msec)
http://www.ietf.org/ids.by.wg/msec.html
IETF Draft Open Specifications for PGP
http://www.ietf.org/ids.by.wg/openpgp.html
IETF Draft for PKI
http://www.ietf.org/ids.by.wg/pkix.html
IETF Draft for PPP Extensions
http://www.ietf.org/ids.by.wg/pppext.html
IETF Draft for S/MIME Mail Security
http://www.ietf.org/ids.by.wg/smime.html
IETF Draft for Transport Layer Security (TLS)
http://www.ietf.org/ids.by.wg/tls.html
 
 

 Links: ACM || CiteSeer || CMU SEI || Construx || Cutter || IEEE-CS || itmWEB
Shanghai IT || Shanghai Economic Commission || SSIA || Shanghai Component Repository
LJYW || SPRT || PKSPIN || CCW Shanghai || China IT Outsourcing Summit more 
contribution guide | FAQ | about | copyright | contact
last update on 2005-04-08
better use IE 5.0 or above (800*600 or above)
© 2000-2005 Software Export and IT Transfer Center, ASTI Shanghai
All Rights Reserved.