Internet Protocol

Results: 12400



#Item
401Internet privacy / World Wide Web / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet marketing / Information privacy / Marketing / Computer security / Web analytics / Opt-out / Targeted advertising

Cookies and privacy Use of cookies by www.f4f.com Cookies are small text files that are placed on your computer by websites that you visit. They are widely used in order to make websites work, or work more efficiently, a

Add to Reading List

Source URL: www.f4f.com

Language: English - Date: 2016-02-10 08:14:44
402Computing / Network architecture / Network protocols / Internet Standards / Network booting / Unified Extensible Firmware Interface / Trivial File Transfer Protocol / Units of information / Transmission Control Protocol / User Datagram Protocol / Datagram / Packet loss

Network Working Group Request for Comments: 783 K. R. Sollins MIT June, 1981

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-06-21 11:58:07
403Computing / Network architecture / Cryptographic protocols / Internet protocols / Tunneling protocols / Wireless networking / IPsec / Internet security / Extensible Authentication Protocol / Internet Key Exchange / 6LoWPAN / Virtual private network

Name : Azamuddin Rotation Project Title : Survey on IoT Security Outline : • • •

Add to Reading List

Source URL: www.cs.wustl.edu

Language: English - Date: 2016-01-09 09:36:29
404Computing / Message-oriented middleware / Network protocols / Cloud infrastructure / Open standards / Internet of things / MQTT / Gateway / OPC Unified Architecture / Advanced Message Queuing Protocol / EtherCAT / Cloud computing

Beckhoff solutions for Industrie 4.0 and IoT

Add to Reading List

Source URL: www.pc-control.net

Language: English - Date: 2016-08-02 05:38:11
405Computing / Network architecture / Internet / Routing algorithms / Multipath routing / Routing / Border Gateway Protocol / Transmission Control Protocol / Load balancing / Equal-cost multi-path routing

Microsoft Word - PhD position multipath networks 2016 en.docx

Add to Reading List

Source URL: icube-reseaux.unistra.fr

Language: English - Date: 2016-04-18 17:34:23
406Internet privacy / Computing / Computer security / Microsoft / Computer access control / Hypertext Transfer Protocol / Privacy / Identity documents / HTTP cookie / Information privacy / Personally identifiable information / Single sign-on

  Castle Software, Inc. Data Privacy & Security Policy Castle Software, Inc. ("Castle") is committed to protecting the privacy of its users. Because  Castle gathers certain types of information abou

Add to Reading List

Source URL: www.castlelearning.com

Language: English - Date: 2015-09-17 09:11:17
407Computing / Internet Standards / African diaspora / Internet / Nas / Dynamic Host Configuration Protocol / RADIUS

How Dynamic is the ISPs Address Space? Towards Internet-Wide DHCP Churn Estimation Giovane C. M. Moura?, Carlos Gañán, Qasim Lone, Payam Poursaied, Hadi Asghari, and Michel van Eeten

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-29 15:26:52
408Computing / Computer network security / Internet Standards / Internet protocols / Wireless networking / Network access / RADIUS / Extensible Authentication Protocol / Wireless security / IEEE 802.1X / Authentication protocol / Network access server

ARADIAL RADIUS Product Overview including Wimax http://www.aradial.com ARADIAL RADIUS Product Overview

Add to Reading List

Source URL: www.aradial.com

Language: English - Date: 2011-09-14 05:14:32
409Computing / Network architecture / Internet / Computer networking / Internet protocols / Internet Standards / Routing protocols / Routing / Border Gateway Protocol / Router / Route reflector / Convergence

Impact of BGP Dynamics on Router CPU Utilization Sharad Agarwal1 , Chen-Nee Chuah2 , Supratik Bhattacharyya3 , and Christophe Diot4 1 University of California, Berkeley, USA, 2

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 15:34:59
410Computing / Internet Relay Chat / Network protocols / Web development / Clientserver model / Inter-process communication / Network architecture / Denial-of-service attack / Transmission Control Protocol / Hypertext Transfer Protocol / Load balancing / Web server

A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds Yi-Hsuan Kungk , Taeho Lee† , Po-Ning Tsengk , Hsu-Chun Hsiaok ∗ , Tiffany Hyun-Jin Kim‡ ∗ , Soo Bum Lee§ ∗ , Yue-Hsun

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-09-10 05:14:02
UPDATE