Technology experts say implementing the secure protocol can slow page loading and put additional strains on corporate servers.
CNN: Why Google's data collection snafu could be good for Gmail
Internet engineers also complain that RRP uses the Secure Sockets Layer protocol, which doesn't provide an audit trail for resolving domain-name disputes.
Credit card companies are working with CyberCash and Netscape Communications to develop and implement the new Secure Electronic Transaction protocol for online credit card commerce.
If you want to get a little more technical, take a look at whether the website you are using to transmit information is using HTTPS -- hypertext transfer protocol secure.
In the early days of his research, Cerf said, he worked on a more secure version of his networking protocol for the National Security Agency, but wasn't able to implement that technology in what would become the public Internet.
Silent Phone deploys the ZRTP peer-to-peer encryption protocol which is recognized as the leading standard for secure end-to-end communication in a Voice over Internet Protocol (VoIP) telephone call.
FORBES: Silent Circle Adds Android For Encrypted Voice And Video Calls
For example, IPSec is mandatory to implement in IPv6 compliant protocol stacks, while Secure Neighbor Discovery capabilities, Privacy Addresses, and Unique Local Addresses (ULA) all provided additional security enhancements.
Eight years ago, fresh out of Stanford, Kocher cowrote Secure Sockets Layer (SSL), the protocol that secures the vast majority of commerce on the Internet.
He suggested that once the government could be sure that the EU's external borders were "secure" the UK should join the Schengen protocol on removing internal borders within the union.
Similarly, Facebook and Twitter send login credentials over a secure line and then revert to an unsecure protocol. (Users of those social networks can add an "s" after "http" to force the systems to encrypt their browsing.) Social networking sites are where people increasingly conduct private conversations, whether through Facebook's Messages or Twitter's Direct Message feature.
CNN: Why Google's data collection snafu could be good for Gmail
The December summit in Denmark is intended to secure a new international agreement to replace the Kyoto Protocol, which expires in 2012.
These referred to ways to establishing a secure communication link between different types of computers using a protocol referred to as TARP (Tunneled Agile Routing Protocol).
For public consumption, the change in protocol is all about protecting users, making the system more secure, warding off keystroke loggers.
FORBES: Sex Scandals Distract While Twitter Pulls A Fast One
应用推荐