IEEE Internet Computing

Results: 576



#Item
311Computer network security / Email / Cryptographic software / Internet privacy / Cryptography / Password / Wireless security / Pretty Good Privacy / Phishing / Computer security / Computing / Internet

S08-132-IEEE.Internet.Comp.indd

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2008-05-21 11:01:48
312Technology / Geolocation / Cryptographic software / Geosocial networking / Location-based service / Tracking / Tor / Email / Anonymity / Internet / Computing / Internet privacy

IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 7, NO. 1,

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2010-05-15 06:46:43
313Routing algorithms / Network theory / Routing protocols / Routing / Network topology / Overlay network / Open Shortest Path First / Tor / Shortest path problem / Computing / Network architecture / Internet

IEEE INFOCOM 2005 POSTER SESSION 1 Positioning Relay Nodes in ISP Network Meeyoung Cha† , Sue Moon† , Chong-Dae Park‡

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2005-06-28 01:52:00
314IEEE 802.11 / Computer network security / Computing / Wireless / Wi-Fi / AOSS / Wireless LAN / Wireless router / IEEE 802.11i-2004 / Wireless networking / Cryptographic protocols / Technology

Wireless Networking AirStationTM NfinitiTM Wireless-N Router The ideal Internet and network solution for the home and small office environment. Perfect for streaming HD movies, music, and e-mailing from multiple PC’s s

Add to Reading List

Source URL: www.dabs.com

Language: English - Date: 2010-05-21 09:36:48
315Ambient intelligence / Internet of Things / Machine-to-Machine / Weightless / Communications protocol / Cloud computing / Home automation / Institute of Electrical and Electronics Engineers / Computing / Technology / Information

IEEE Internet of Things (IoT) eNewsletter Author Guidelines – Updated: September 2, 2014 – The IEEE Internet of Things (IoT) eNewsletter, a bi-monthly online publication that launched in September 2014, features prac

Add to Reading List

Source URL: iot.ieee.org

Language: English - Date: 2014-09-02 12:56:42
316Internet protocols / Internet standards / Network protocols / Local area networks / IEEE 802 / Virtual Router Redundancy Protocol / Virtual LAN / IEEE 802.1Q / IPv6 / Network architecture / Computing / OSI protocols

NEC Group PowerPoint Template: Stream

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2012-04-11 02:19:14
317Technology / Wireless networking / Computer network security / Electronic engineering / Internet Protocol / Extensible Authentication Protocol / EAP-SIM / Wi-Fi Alliance / IEEE 802.11u / Wi-Fi / Cryptographic protocols / Computing

White Paper Architecture for Mobile Data Offload over Wi-Fi Access Networks Introduction Mobile network traffic is growing exponentially, and service providers must manage their networks efficiently to

Add to Reading List

Source URL: www.cisco.com

Language: English
318Internet protocols / Computer networking / Networking hardware / IEEE standards / IGMP snooping / KVM switch / IP multicast / Network switch / Virtual LAN / Computer hardware / Computing / Ethernet

Application Note Ethernet Switches and ServSwitch™ Agility KVM-over-IP Extension Introduction ServSwitch Agility is a KVM system that supports switching and extension of DVI, USB, and audio over an IP infrastructure.

Add to Reading List

Source URL: www.blackbox.com

Language: English - Date: 2014-04-22 09:34:01
319Cryptographic protocols / Technology / Computing / Wireless security / Telecommunications engineering / Wi-Fi / Wireless network / Wired Equivalent Privacy / Wireless distribution system / Computer network security / Wireless networking / IEEE 802.11

Internet Radio INSTRUCTION MANUAL Rev[removed] c

Add to Reading List

Source URL: www.ccrane.com

Language: English - Date: 2014-03-27 12:26:52
320Computer networking / Network performance / Internet protocols / IEEE 802.1X / ActiveSync / Wireless security / RADIUS / Reverse proxy / Microsoft Forefront Threat Management Gateway / Computing / Software / Computer network security

iPhone and iPad in Business Deployment Scenarios September 2012 Learn how iPhone and iPad integrate seamlessly into enterprise environments with these deployment scenarios. • Microsoft Exchange ActiveSync

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2013-09-30 04:06:04
UPDATE