Communications data

Results: 5912



#Item
71Cryptography / Stream ciphers / Data Encryption Standard / Py / VEST / DEAL / Authenticated encryption / Institute for Applied Information Processing and Communications

Robustness of CAESAR candidates Advisor(s): Maria Eichlseder Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
72Scientific method / Science / Knowledge / Replication / Reproducibility / Protocol / Data sharing / Consolidated Standards of Reporting Trials / EQUATOR Network / Communications protocol / Replication crisis

Data Sharing and Replication Christensen Data Sharing and Replication

Add to Reading List

Source URL: www.bitss.org

Language: English - Date: 2016-01-25 14:32:18
73Communications protocol / Data transmission / Protocol

FIERC FORM 4.1 Notice/Agenda of the Meeting Food and Nutrition Research Institute Ethics Review Committee

Add to Reading List

Source URL: www.fnri.dost.gov.ph

Language: English
74Fiber-optic communications / Broadband / Network architecture / Passive optical network / Computing / Gigabit Ethernet / DBm / Measurement / Technology

SEA RANCH CONNECT CALIX 700GE-I INDOOR OPTICAL NETWORK TERMINALS DATA SHEET PO Box 16

Add to Reading List

Source URL: www.searanchconnect.org

Language: English - Date: 2016-05-17 16:36:20
75Cryptography / Public-key cryptography / Communications protocol / Data transmission / Digital signature / Short Message Service / Adversary / Peer-to-peer / Secure multi-party computation

A Game-Theoretic Framework for Analyzing Trust-Inference Protocols∗ Ruggero Morselli† Jonathan Katz†

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-03-28 14:11:04
76European Union directives / Information privacy / Europe / Public law / Law / European Union / General Data Protection Regulation / Telecoms Package / Directive on Privacy and Electronic Communications / Data Protection Directive / Data Retention Directive / Universal Service Directive

Working document 1.0 Proposals for an amendment to the General Data Protection Regulation and repealing the ePrivacy Directive 29 May 2015

Add to Reading List

Source URL: www.etno.eu

Language: English - Date: 2015-05-30 18:00:00
77Computing / Supercomputers / Computer networks / Parallel computing / Ethernet / Computer memory / IWARP / Remote direct memory access / Apache Hadoop / Chelsio Communications / WARP / InfiniBand

Accelerating Hadoop with iWARP RDMA Execution-Time Benchmark Results for Big Data Offload Executive Summary Apache Hadoop is a framework that allows for the scalable distributed processing of large data sets across clust

Add to Reading List

Source URL: www.chelsio.com

Language: English - Date: 2015-04-01 04:36:38
78Computing / Computer networking / Media technology / Technology / Telecommunications / Inter-process communication / Email / Communications protocol / STREAMS / Data transmission

Microsoft Word - IBSKDS full.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:43:08
79Computing / Data management / Communications protocol / Data transmission / Computer networking / Data / Computer security / Telecommunications engineering / Data center / Information security

University of New Mexico IT Network Design Recommendations Fall, 2012 Prepared by:

Add to Reading List

Source URL: cio.unm.edu

Language: English
80Security / Cyberwarfare / Computer security / Computer network security / Hacking / Vulnerability / Risk / Common Weakness Enumeration / Vulnerability database / CVSS / National Vulnerability Database / Cross-site scripting

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Add to Reading List

Source URL: www.jocm.us

Language: English - Date: 2015-03-08 23:14:44
UPDATE