Communication protocol

Results: 2818



#Item
91Security / Prevention / Biometrics / Cybercrime / E-commerce / Secure communication / Speaker recognition / Speech processing / Authentication / Password / Computer security / Transmission Control Protocol

Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:59:39
92Computing / Internet protocols / Internet Standards / World Wide Web / URI schemes / HTML / Hypertext Transfer Protocol / Web Services Description Language / Uniform Resource Identifier / HTML element / Ping / XML Schema

BIC Realtime Returns Authorisation Request and Response Book Industry Communication BIC Realtime

Add to Reading List

Source URL: www.bic.org.uk

Language: English - Date: 2016-03-23 12:42:48
93Federal Communications Commission / Logistics / Emergency telephone number / 9-1-1 / Dispatch / Economy / Communication / Language / 911 Tapping Protocol / 000

Help Us Help You: Your Guide to CallingEmergency Services To best respond to an emergency situation, call takers, dispatchers and first responders need your help. Familiarize yourself and those living or visiting

Add to Reading List

Source URL: www.ellavillega.com

Language: English - Date: 2011-09-29 16:25:26
94Emergency Alert System / Emergency management / Wireless Emergency Alerts / Integrated Public Alert and Warning System / Common Alerting Protocol / AMBER Alert / Alert messaging / Emergency communication system / WEA / Text messaging / Emergency population warning / Digital Emergency Alert System

TAB 21 – Wireless Emergency Alerts (WEA) IPAWS Overview The Integrated Public Alert and Warning System (IPAWS) is a comprehensive, coordinated, integrated system that can be used by authorized public officia

Add to Reading List

Source URL: mil.wa.gov

Language: English - Date: 2014-08-25 17:01:47
95Computing / Information / Business intelligence / Data management / Knowledge representation / Records management / Technical communication / Experiment / Protocol / File system / Communications protocol / Internet Protocol

Particular example BioWes www.biowes.org Project supporte by the Technology Agency fo the

Add to Reading List

Source URL: www.biowes.org

Language: English - Date: 2014-10-14 02:19:31
96Computing / Web standards / World Wide Web / HTML / Internet protocols / Web Services Description Language / HTML element / Hypertext Transfer Protocol / Query string

BIC Realtime Trade Order Request and Order Response Book Industry Communication BIC Realtime

Add to Reading List

Source URL: www.bic.org.uk

Language: English - Date: 2016-03-23 12:35:10
97Information science / Information / Computing / Communication / Open access / Academic publishing / Archival science / Digital libraries / Irus / Institutional repository / Protocol for Metadata Harvesting / EPrints

Making scholarly statistics count in UK repositories Ross MacIntyre, Mimas, The University of Manchester UKSG Conference April 2013

Add to Reading List

Source URL: www.irus.mimas.ac.uk

Language: English - Date: 2015-07-27 06:19:40
98Software / Graphics software / Communication design / Digital photography / Image processing / Graphic design / Transmission Control Protocol / Layers / Network switch / Adobe Photoshop / Network architecture

Are there times when you struggle to see what is on a particular layer in a Photoshop document? Do you wish there was a way to have the thumbnails larger in size? Well, there is! There are, in fact, 2 changes we can make

Add to Reading List

Source URL: snickerdoodledesignsbykaren.com

Language: English - Date: 2015-12-11 11:24:17
99Computing / Network architecture / Internet protocols / Secure communication / World Wide Web / Computer networking / Transport Layer Security / QUIC / Proxy server / SPDY / HTTPS / Hypertext Transfer Protocol

The Cost of the “S” in HTTPS David Naylor? , Alessandro Finamore† , Ilias Leontiadis‡ , Yan Grunenberger‡ , Marco Mellia† , Maurizio Munafò† , Konstantina Papagiannaki‡ , and Peter Steenkiste? ? Carnegi

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:14
100Computing / Network architecture / Internet / Network performance / Cryptographic protocols / Secure communication / Internet protocols / Flow control / Transmission Control Protocol / Transport Layer Security / TCP congestion control / HTTPS

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
UPDATE