Internet layer

Results: 1652



#Item
381Cryptographic protocols / Secure communication / Internet standards / HTTP / Transport Layer Security / HTTP Secure / Hypertext Transfer Protocol / Reverse proxy / Dynamic SSL / Computing / Internet / Network architecture

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T. Lesniewski-Laas S.B., Massachusetts Institute of Technology (2001)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:14
382Internet / Network protocols / Routing protocols / Internet broadcasting / Multicast / Internet Group Management Protocol / Network layer / Allied Telesis / PIM Dense Mode / Network architecture / Computing / Internet protocols

Training | CAE-M/ENT Net.Campus Certified Allied Telesis Expert / Multicast Enterprise Solution Introduction

Add to Reading List

Source URL: alliedtelesis.ae

Language: English - Date: 2014-02-10 18:05:29
383OSI protocols / Computer networking / Internet Protocol / Internet protocols / Communications protocol / Packet Processing / OSI model / Link layer / Packet switching / Computing / Network architecture / Data

From Protocol Stack to Protocol Heap – Role-Based Architecture Robert Braden and Ted Faber USC Information Sciences Institute 4676 Admiralty Way Marina del Rey, CA

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2002-09-04 11:54:10
384Network protocols / Mobile IP / Proxy Mobile IPv6 / IPv6 / Multicast / Network layer / IPv4 / Handover / Mobility Framework / Network architecture / Computing / Internet

Fast Handover Using Explicit Multicast for IPv6-based Wireless LAN Networks Lei LI DOCTOR OF

Add to Reading List

Source URL: www.nii.ac.jp

Language: English - Date: 2006-03-23 02:17:12
385Cryptographic protocols / Secure communication / Internet standards / Data loss prevention software / Transport Layer Security / Cloud computing / Information privacy / Internet privacy / Data security / Computing / Computer security / Internet

DLP-diagram-simplified-v2-vertical

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:28
386Internet privacy / Public-key cryptography / Email authentication / Internet standards / PGP / Password / Pretty Good Privacy / Email / Transport Layer Security / Cryptography / Internet / Computing

Using Formstack to Safely Capture More Responses in Higher Education Efficiency & Security

Add to Reading List

Source URL: www.formstack.com

Language: English - Date: 2015-05-08 10:40:00
387Secure communication / Internet standards / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / X.509 / Public-key cryptography / Key / Cryptography / Cryptographic protocols / Internet protocols

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2006-05-16 18:05:25
388Industrial Ethernet / EtherNet/IP / Data link layer / Internet protocol suite / Communications protocol / Link layer / Data / Computing / OSI protocols

Release Version 1.1 CSIRO Exploration & Mining Report P2005/75 Interconnection of Landmark Compliant Longwall Mining Equipment – Shearer Communication Specification for OEMAccessible Inertial Sensor Data.

Add to Reading List

Source URL: www.lascautomation.com

Language: English - Date: 2008-05-27 20:06:33
389Electronic commerce / Wireless Application Protocol / WAP gateway / Wireless Transport Layer Security / Entrust / Wireless access point / Wireless Internet Protocol / Public key infrastructure / WAP billing / Cryptography / Technology / Computing

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:54
390Wireless Application Protocol / Mobile technology / Wireless Transport Layer Security / Wireless access point / Mobile commerce / Ericsson / Public key infrastructure / Internet / Mobile banking / Technology / Cryptography / Electronic commerce

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:35
UPDATE