Data Transmission Network

Results: 1754



#Item
891Internet protocols / Cryptographic protocols / Internet standards / Hashing / Computer network security / Kerberos / HMAC / Hash function / Transmission Control Protocol / Computing / Cryptography / Data

The KX.509 Protocol William Doster Marcus Watts Dan Hyde University of Michigan

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2001-09-26 12:44:24
892Packet capture / Transmission Control Protocol / Firewall / Data / Computer network security / Computing / Network architecture

Wiretapping the Internet C.J. Antonelli, P. Honeyman Center for Information Technology Integration, University of Michigan, Ann Arbor† ABSTRACT With network security threats and vulnerabilities increasing, solutions ba

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2002-03-05 15:54:08
893Internet protocols / Transmission Control Protocol / Traffic flow / Construct / Smart card application protocol data unit / Serial Line Internet Protocol / Internet protocol suite / Network packet / SOCKS / Computing / OSI protocols / Information

CITI Technical Report[removed]Webcard: a Java Card web server Jim Rees Peter Honeyman [removed]

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 1999-11-23 11:17:20
894Computing / IP multicast / Transmission Control Protocol / User Datagram Protocol / Multicast / Network packet / Transport layer / EMI / Internet protocols / Network architecture / Internet

HKEx Orion Market Data Platform Document History

Add to Reading List

Source URL: www.hkex.com.hk

Language: English - Date: 2015-02-08 21:36:22
895Data transmission / Local area networks / Computer network security / Virtual LAN / Network architecture / DMZ / Reverse proxy / Network security / Proxy server / Computing / Computer networking / Network performance

  How the Virtual Services Platform Works The Virtual Services Platform (VSP) takes the concept of an entire network built specifically for security and functionality into a single platform and virtualizes the network

Add to Reading List

Source URL: www.iwebgate.com

Language: English - Date: 2014-07-28 09:03:03
896Wireless sensor network / Mesh networking / Computing / Fusionopolis / Wireless network / Electronics / Data transmission / IEEE 802.11s / Wireless community network / Wireless networking / Wireless ad-hoc network / Wireless mesh network

Co-operate To Communicate! The project studies novel distributed, co-operative and co-ordination schemes for better bandwidth utilization in ad-hoc, Wireless Mesh (WMN) and Sensor Networks (WSN). Current co-operative co

Add to Reading List

Source URL: www.i2r.a-star.edu.sg

Language: English - Date: 2013-09-05 07:27:18
897Computing / Data security / Firewall / Transmission Control Protocol / Denial-of-service attack / Computer network security / Cyberwarfare / Computer security

Protect Websites from Cyber Attack_2015 v2.1

Add to Reading List

Source URL: www.cybersecurity.hk

Language: English - Date: 2015-01-21 05:23:37
898Data transmission / Local area networks / Computer network security / Virtual LAN / Network architecture / DMZ / Reverse proxy / Network security / Proxy server / Computing / Computer networking / Network performance

  How the Virtual Services Platform Works The Virtual Services Platform (VSP) takes the concept of an entire network built specifically for security and functionality into a single platform and virtualizes the network

Add to Reading List

Source URL: iwebgate.com

Language: English - Date: 2014-07-28 09:03:03
899Internet protocols / Internet standards / Network packet / Transmission Control Protocol / User Datagram Protocol / Communications protocol / Packet switching / Trivial File Transfer Protocol / Information / Data / Computing

MACH Protocol Specification Revision Date: [removed]Version: 1.2a

Add to Reading List

Source URL: www.miaxoptions.com

Language: English - Date: 2015-03-04 17:07:51
900Transmission Control Protocol / Free software / Communications protocol / Computing / Computer network security / Data / Software licenses / Information

German researchers develop defense software: Potential protection against the "Hacienda" intelligence program

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-03-08 12:29:05
UPDATE