| | ETSI Releases Tetra Algorithms to Public Domain (etsi.org) |
|
2 points by Sami_Lehtinen 10 months ago | past
|
| | How Git object deduplication works in Gitlab (etsi.org) |
|
2 points by trynewideas on Jan 30, 2023 | past
|
| | EU-Alert specification (2019) [pdf] (etsi.org) |
|
1 point by pfoof on Dec 12, 2022 | past | 1 comment
|
| | Lawful Interception (LI); Inter LEMF Handover Interface (etsi.org) |
|
4 points by DyslexicAtheist on April 17, 2021 | past
|
| | Enterprise Transport Security (etsi.org) |
|
1 point by tosh on Nov 9, 2020 | past | 1 comment
|
| | ESTI EN 303 645: Cyber Security for Consumer Internet of Things [pdf] (etsi.org) |
|
2 points by msiebuhr on July 2, 2020 | past
|
| | New European Standard for Consumer IoT Security (etsi.org) |
|
1 point by dan-c-underwood on June 30, 2020 | past
|
| | ETSI ICT Standards: Lawful Interception (etsi.org) |
|
16 points by severine on Oct 29, 2019 | past | 1 comment
|
| | Middlebox Security Protocol [pdf] (etsi.org) |
|
1 point by tosh on Jan 17, 2019 | past
|
| | eTLS - a deliberately weakened European TLS standard (etsi.org) |
|
3 points by weinzierl on Nov 15, 2018 | past | 2 comments
|
| | ETLS for passive snooping of TLS 1.3 data in enterprise environments (etsi.org) |
|
2 points by djsumdog on Nov 13, 2018 | past
|
| | ETLS specification [pdf] (etsi.org) |
|
1 point by Tomte on Nov 13, 2018 | past
|
| | Edge Computing definition from ETSI [pdf] (etsi.org) |
|
2 points by livid on Aug 13, 2018 | past
|
| | Presentations from ETSI Conference on 5G Security (2017 06) (etsi.org) |
|
1 point by jugbee on July 31, 2017 | past
|
| | Soliloquy algorithm [pdf] (etsi.org) |
|
2 points by waroc on Oct 2, 2015 | past
|