Internet layer

Results: 1652



#Item
461Internet / Transmission Control Protocol / User Datagram Protocol / Transport layer / Firewall / Port / Load balancing / Network address translation / Windows Vista networking technologies / Computing / Internet protocols / Network architecture

Improving DNS performance using “Stateless” TCP in FreeBSD 9 David Hayes, Mattia Rossi, Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 101022A Swinburne University of Technology Melbo

Add to Reading List

Source URL: caia.bsee.swin.edu.au

Language: English - Date: 2010-10-24 18:00:16
462Internet / Network architecture / Internet standards / HTTP / HTTP Secure / Load balancing / Transport Layer Security / Application delivery controller / SSL acceleration / Cryptographic protocols / Secure communication / Computing

Recent  work  in  OpenBSD  relayd AsiaBSDCon  2013 Reyk  Flöter  () ライクフローター Agenda

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2013-04-02 16:02:24
463Internet / Internet standards / Computer network security / Cyberwarfare / Streaming / Transmission Control Protocol / Port / Transport layer / Secure Shell / Computing / Internet protocols / Network architecture

Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection Holger Dreger TU M¨unchen Anja Feldmann

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2009-04-11 23:28:18
464Internet protocols / Network performance / Flow control / TCP/IP / Datagram Congestion Control Protocol / Explicit Congestion Notification / Data transmission / Transport layer / Transmission Control Protocol / Computing / Network architecture / Data

Designing DCCP: Congestion Control Without Reliability Eddie Kohler Mark Handley Sally Floyd

Add to Reading List

Source URL: www.read.cs.ucla.edu

Language: English - Date: 2006-04-03 23:47:15
465Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Public-key cryptography / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Abstract

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
466Network protocols / IPv6 / Tunneling protocols / Mobile IP / Proxy Mobile IPv6 / Care-of address / Network layer / IPsec / IP address / Network architecture / Internet Protocol / Computing

Designing the Mobile IPv6 Security Protocol Tuomas Aura, Michael Roe April 2006 Technical Report MSR±TR±2006±42

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2006-04-12 13:50:14
467Data / User Datagram Protocol / Transmission Control Protocol / Transport layer / Network congestion / Traffic flow / Port / UDP Lite / UDP hole punching / Internet protocols / Computing / Network architecture

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2012-03-19 08:45:11
468Internet protocols / Internet / Computer network security / Virtual private networks / Internet standards / Point-to-Point Tunneling Protocol / Layer 2 Tunneling Protocol / OpenVPN / Internet Protocol Control Protocol / Computing / Tunneling protocols / Network architecture

Npppd: easy vpn with OpenBSD Giovanni Bechis Institute of Biostructures and Bioimaging, Napoli, Italy

Add to Reading List

Source URL: www.snb.it

Language: English - Date: 2013-04-06 13:07:24
469Internet standards / Electronic commerce / Internet protocols / Transport Layer Security / Dynamic SSL / Cryptography / Public-key cryptography / Secure communication

CloudFlare tackles lost SSL key risk with Keyless SSL

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-03 12:51:26
470Representational state transfer / Software architecture / Key management / OAuth / Cryptographic software / Secure communication / Transport Layer Security / Data Protection API / Cloud standards / Computing / Internet protocols

RESTful SecurityW2SP Dan Forsberg Nokia Research Center & Helsinki University of Technology (HUT)

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:05
UPDATE