Communication protocol

Results: 2818



#Item
671Information / Lise Menn / Psycholinguists / Copyright / Cognitive science / Menn / Spreadsheet / Repeatable Battery for the Assessment of Neuropsychological Status / Neuropsychological tests / Data / Neuropsychology

Communication recovery after TBI TBI Bank Protocol List

Add to Reading List

Source URL: talkbank.org

Language: English - Date: 2011-02-03 17:53:55
672Internet Protocol / Wireless / Time-Division Long-Term Evolution / Mobile technology / ISM band / Radio spectrum / Spectrum management / Wireless networking / LTE Advanced / Technology / Universal Mobile Telecommunications System / 3GPP Long Term Evolution

LTE in Unlicensed Spectrum Dongning Guo joint work with Fei Teng and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University Communication Theory Workshop, Curacao

Add to Reading List

Source URL: www.ieee-ctw.org

Language: English - Date: 2014-06-24 20:07:19
673Computer network security / Computer-mediated communication / Horror fiction / Multi-agent systems / Email spam / Simple Mail Transfer Protocol / Postfix / Botnet / Storm botnet / Computing / Spamming / Email

IBM Research Zombies suck the life out of the mail server (“new developments” from LISA 2010 presentation)

Add to Reading List

Source URL: www.postfix.org

Language: English - Date: 2010-11-18 10:10:00
674Wireless networking / Technology / Internet protocols / Computing / Internet / X.509 / Revocation list / Vehicular communication systems / Online Certificate Status Protocol / Public-key cryptography / Key management / Cryptographic protocols

Paper Title (use style: paper title)

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-07-04 20:03:19
675Computing / Computer-mediated communication / Spam filtering / Anti-spam techniques / Spam / Email spam / Open mail relay / Simple Mail Transfer Protocol / CAN-SPAM Act / Spamming / Email / Internet

Anti-Spam Technical Alliance Technology and Policy Proposal Version 1.0 Anti-Spam Technical Alliance (ASTA) 22 June 2004

Add to Reading List

Source URL: www.uceprotect.net

Language: English - Date: 2008-05-01 19:35:32
676Mydoom / Simple Mail Transfer Protocol / Sobig / MX record / Computer worm / Port / Transmission Control Protocol / Backscatter / Denial-of-service attack / Email / Computer-mediated communication / Computing

A Study of Mass-mailing Worms Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh, PA, 15213 {cindywon, bielski, jonmccune, chenxi}@cmu.edu

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-04 03:14:45
677Technical communication / Earth sciences graphics software / NetCDF / OPeNDAP / MATLAB / File Transfer Protocol / X Window System / Server / Software / Computing / Computer file formats

HYCOM Data Service An overview of the current status and new developments in Data

Add to Reading List

Source URL: hycom.org

Language: English - Date: 2009-05-23 20:11:15
678Secure communication / Data / Information / Transport Layer Security / Cipher suite / HTTP Secure / STARTTLS / Server Name Indication / Extensible Messaging and Presence Protocol / Cryptographic protocols / Internet protocols / Computing

draft-ietf-uta-tls-bcp-11 - Recommendations for Secure Use of TLS and DTLS

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-02-23 04:04:03
679Technology / Extensible Messaging and Presence Protocol / XMPP Standards Foundation / XEP / Service discovery / Uniform resource identifier / Computing / Computer-mediated communication / Jingle

XEP-0234: Jingle File Transfer Peter Saint-Andre mailto: xmpp: https://stpeter.im

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 13:22:03
680Secure communication / Data / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / Cipher suite / SSL acceleration / HTTP Secure / Cryptography / Cryptographic protocols / Computing

The Design and Implementation of Protocol-Based Hidden Key Recovery Eu-Jin Goh1 , Dan Boneh1 , Benny Pinkas2 , and Philippe Golle1 1 Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-07-21 17:54:06
UPDATE