IPsec/Related Articles
< IPsec
Jump to navigation
Jump to search
- See also changes related to IPsec, or pages that link to IPsec or to this page or whose text contains "IPsec".
Parent topics
Subtopics
- Internet Key Exchange [r]: Add brief definition or description
- Encapsulated Security Payload [r]: Add brief definition or description
- Authentication Header [r]: Add brief definition or description
- IPv6 [r]: Add brief definition or description
- FreeSWAN [r]: A Linux implementation of the IPsec protocols, intended to make wholesale monitoring of the Internet impossible. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Secure Shell [r]: Network protocol for secure remote login, providing an encrypted connection instead of the unencrypted, and therefore insecure, connection of telnet. [e]
- Internet [r]: International "network of networks" that connects computers together through the Internet Protocol Suite and supports applications like Email and the World Wide Web. [e]
- Opportunistic encryption [r]: A technique whereby computers can set up their own encrypted connections, without any connection-specific setup by an administrator. [e]
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
- Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]