Cryptographic engineering

Results: 331



#Item
311Cryptographic protocols / Technology / Network access / Electronic engineering / Wi-Fi Protected Access / Wi-Fi / Service set / Wireless access point / Computing / Wireless networking / Computer network security / IEEE 802.11

W_LAN_Access_Point_Bestellformulare_E_2014.indd

Add to Reading List

Source URL: book-fair.com

Language: English - Date: 2014-04-14 18:10:57
312Computer network security / Electronic engineering / Wi-Fi / Wireless access point / Password / IEEE 802.11 / Service set / Cryptographic protocols / Wireless security / Wireless networking / Technology / Wireless

Connecting to the Rovernet WPA2 Secured Wireless Network with the Windows Mobile 6 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in or

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-06-22 11:17:18
313Electronic engineering / H.264/MPEG-4 AVC / Cryptographic hash function / Group of pictures / Digital signature / Macroblock / Inter frame / H.262/MPEG-2 Part 2 / Video compression / Cryptography / Video

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc, San Diego [removed]

Add to Reading List

Source URL: www.nandakishore.com

Language: English - Date: 2006-12-26 18:14:00
314Cryptography / Relational database management systems / Cryptographic software / Alexander Kornbrust / Database management systems / Oracle Corporation / Oracle Database / Encryption software / Database / Data management / Software / Computing

Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms Alexander Kornbrust 28-July-2005

Add to Reading List

Source URL: www.red-database-security.de

Language: English - Date: 2009-06-10 05:45:54
315Orthogonal frequency-division multiplexing / Wi-Fi Protected Access / DBm / Wi-Fi / Data / 11i / Technology / Telecommunications engineering / Cryptographic protocols / Computer network security / IEEE 802.11

I N T U I C O M BroadBand Solutions 5GHz[removed]GHz BROADBAND SPECIFICATIONS K E Y F E AT U R E S

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2014-03-13 14:27:02
316Electronic engineering / H.264/MPEG-4 AVC / Cryptographic hash function / Digital signature / Group of pictures / Motion JPEG / H.262/MPEG-2 Part 2 / Inter frame / Video compression / Cryptography / Video

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy K. R. Rao

Add to Reading List

Source URL: www.nandakishore.com

Language: English - Date: 2006-12-26 18:14:17
317Key management / National security / Public-key cryptography / Filesystem-level encryption / File system / Cryptographic protocol / Computer security / Key / Cryptographic engineering / Cryptography / Cryptographic software / Special purpose file systems

Alina Mihaela Oprea CONTACT INFORMATION Address Tel.

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-11-30 10:40:05
318Home automation / Telecommunications engineering / Internet protocols / Z-Wave / Cryptographic protocols / ZigBee / Password authentication protocol / Transmission Control Protocol / Bluetooth / Wireless networking / Technology / Computing

Security Evaluation of the Z-Wave Wireless Protocol

Add to Reading List

Source URL: research.sensepost.com

Language: English - Date: 2013-08-14 07:38:54
319Cryptographic protocols / IEEE 802.11 / Home automation / HomeRF / Electronic engineering / Computing / Wireless security / Wired Equivalent Privacy / Wireless LAN / Computer network security / Wireless networking / Technology

A Comparison of Security in HomeRF versus IEEE802.11b Though the possibility of attacks similar to those leveled at 802.11b systems exist in

Add to Reading List

Source URL: www.cazitech.com

Language: English - Date: 2012-04-15 22:00:28
320Cryptographic protocols / Videotelephony / Internet protocols / Internet standards / Multimedia / IP Multimedia Subsystem / Service layer / Voice over IP / Session Initiation Protocol / Technology / Computing / Electronic engineering

Journal of Theoretical and Applied Information Technology 10th May[removed]Vol. 51 No.1 © [removed]JATIT & LLS. All rights reserved.

Add to Reading List

Source URL: www.jatit.org

Language: English - Date: 2013-05-11 01:49:05
UPDATE