Internet protocols

Results: 10195



#Item
891Computing / Network architecture / Internet / Routing / Computer networking / Internet Standards / Internet protocols / Border Gateway Protocol / IP forwarding / Route reflector / Open Shortest Path First / Router

A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jenifer Rexford††, Scott Shenker

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2012-10-05 20:46:17
892Internet protocols / Secure communication / Internet Standards / Transmission Control Protocol / Relay / Tor / Transport layer / Internet Relay Chat flood / HTTPS / Denial-of-service attack / Quality of service / Internet Relay Chat

IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2014-09-10 17:17:22
893CCSDS / Spaceflight / Measurement / Deep Space Network / Consultative Committee for Space Data Systems / Internet protocols / German Aerospace Center / Sana / Syrian Arab News Agency / Domain Name System

SPACE ASSIGNED NUMBERS AUTHORITY (SANA)— ROLE, RESPONSIBILITIES, POLICIES, AND PROCEDURES DRAFT CCSDS RECORD

Add to Reading List

Source URL: www.viagenie.ca

Language: English - Date: 2009-11-30 15:01:18
894Secure communication / Cryptographic protocols / Cryptographic software / Public-key cryptography / Internet Standards / Cipher suite / X.509 / Netscape / Transport Layer Security

SSL: Paved With Good Intentions

Add to Reading List

Source URL: www.westpoint.ltd.uk

Language: English - Date: 2015-10-01 10:06:33
895Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner

S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2007-07-26 16:56:51
896Computing / Internet / Internet protocols / Domain name system / Cache / Internet Standards / DNS spoofing / Name server / Load balancing / Content delivery network / Time to live / Comparison of DNS server software

ECO-DNS: Expected Consistency Optimization for DNS Chen Chen Carnegie Mellon University

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:11
897Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
898Software / Computing / System software / Internet Standards / Internet protocols / Network management / System administration / Balabit / Science and technology in Hungary / Syslog-ng / Telenor / Dubai Islamic Bank

REFERENCE REVIEW list of companies using BalaBit products BALABIT - RERERENCE REVIEW2000-2013 BalaBit IT Security ■ All rights reserved. ■ www.balabit.com Copyright

Add to Reading List

Source URL: www.balabit.com

Language: English - Date: 2015-04-07 13:20:00
UPDATE