Adrian

Results: 3880



#Item
11Security / Computing / Computer security / Security breaches / Server appliance / Computer network security / Trustwave Holdings / Cybercrime / Cyberwarfare / Malware / Computer virus / Fortinet

JUNECovering the global threat landscape VBWEB COMPARATIVE REVIEW SUMMER 2018 Martijn Grooten & Adrian Luca

Add to Reading List

Source URL: www.virusbulletin.com

Language: English - Date: 2018-07-02 04:00:27
12Domain name system / Internet / Cryptography / Computing / Domain Name System Security Extensions / Sender Policy Framework / DNS-based Authentication of Named Entities / DMARC / Name server / Extension mechanisms for DNS / DNS root zone / Email authentication

Short Paper: On Deployment of DNS-based Security Enhancements Pawel Szalachowski and Adrian Perrig ETH Zurich, Switzerland Abstract. Although the Domain Name System (DNS) was designed as a naming

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
13Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Trusted Computing / Trusted Platform Module / Digital signature / Certificate authority / X.509 / Public key certificate / Domain Name System Security Extensions

CASTLE: CA Signing in a Touch-Less Environment Stephanos Matsumoto†‡ Samuel Steffen‡ Adrian Perrig‡

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
14

Source Accountability with Domain-brokered Privacy Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig ETH Zürich {kthlee, pappasch, david.barrera, psz, adrian.perrig}@inf.ethz.ch ABSTRACT

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
    15Computing / Hierarchical clustering / Network analysis / Information science / Cluster analysis / Data analysis / K-means clustering / Computer cluster / Nearest-neighbor chain algorithm / Document clustering

    Balanced Clustering for Content-based Image Browsing Tim Althoff, Adrian Ulges, Andreas Dengel German Research Center for Artificial Intelligence (DFKI) and University of Kaiserslautern Abstract: In r

    Add to Reading List

    Source URL: www.timalthoff.com

    Language: English - Date: 2012-11-20 09:30:50
    16Computing / Network architecture / Information and communications technology / Internet architecture / Routing / Computer networking / Internet Standards / Internet protocols / Forwarding plane / Router / Packet loss / Hop

    The Case for In-Network Replay Suppression Taeho Lee∗ Christos Pappas∗ Adrian Perrig

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    17Computing / Information theory / Information and communications technology / Telecommunications engineering / Data transmission / Network performance / Computer networking / Internet architecture / Multipath routing / Transmission Control Protocol / Packet loss / Routing

    Deadline-Aware Multipath Communication: An Optimization Problem Laurent Chuat∗ , Adrian Perrig∗ , Yih-Chun Hu† of Computer Science, ETH Zurich, Switzerland † Department of Electrical and Computer Engineering, Uni

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    18

    * *Prepared by Dr. Celia Reyes, senior research fellow, and Mr. Christian Mina and Mr. Adrian Agbon, both supervising research specialists, Philippine Institute for Development Studies. Senotec

    Add to Reading List

    Source URL: pidswebs.pids.gov.ph

    Language: English - Date: 2017-03-01 23:58:50
      19

      Reference Guide Reference Guide: Open Build Service by Adrian Schröter, Frank Schreiner, Karsten Keil, and Stefan Knorr Publication Date:

      Add to Reading List

      Source URL: openbuildservice.org

      Language: English
        20

        Chapter 4 LiDAR for Archaeological Research and the Study of Historical Landscapes Adrian S. Z. Chase, Diane Z. Chase, and Arlen F. Chase

        Add to Reading List

        Source URL: www.caracol.org

        Language: English - Date: 2018-02-07 18:59:25
          UPDATE