Internet protocols

Results: 10195



#Item
971Routing protocols / Routing / Internet protocols / Internet standards / Computer networking / Border Gateway Protocol / IP hijacking / Router / Path vector protocol / Network architecture / Computing / Internet

1 A Survey of BGP Security Issues and Solutions Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer Rexford Abstract

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2008-09-21 13:02:46
972HTTP / Cryptographic protocols / Internet standards / Secure communication / Email / MIME / Hypertext Transfer Protocol / HTTP Secure / Communications protocol / Computing / Data / Information

THE MITRE CORPORATION The TAXII HTTP Protocol Binding Specification Version 1.0 Mark Davidson, Charles Schmidt

Add to Reading List

Source URL: taxii.mitre.org

Language: English - Date: 2013-04-30 13:13:27
973Internet / Internet protocols / Network architecture / Internet standards / Cipher suite / Transport Layer Security / Telex / Proxy server / HTTP Secure / Cryptographic protocols / Secure communication / Computing

To appear in Proc. 20th Usenix Security Symposium (Usenix Security), AugustFor updates, source code, and an online demonstration, visit https://telex.cc. Telex: Anticensorship in the Network Infrastructure Eric Wu

Add to Reading List

Source URL: telex.cc

Language: English - Date: 2015-03-01 23:33:20
974Network architecture / IEEE standards / IEEE 802.3 / Media Access Control / Ethernet over twisted pair / IEEE 802 / Wi-Fi / Ethernet physical layer / JetDirect / OSI protocols / Ethernet / Working groups

ČTÚ - Interface Specifications (announcement according to § 73 of the Act Nothe Electronic Communications) INTERNET CZ, a.s. provides the following public telecommunication services :  

Add to Reading List

Source URL: dc.forpsi.com

Language: English - Date: 2013-12-30 06:20:12
975Software / Computing / Internet protocols / Internet standards / Secure Shell / Login / Password

May 10, 2012 Explanatory meeting for users of supercomputer system -- Basic usage --

Add to Reading List

Source URL: sc.ddbj.nig.ac.jp

Language: English - Date: 2012-09-24 20:41:49
976Data privacy / Differential privacy / Secure multi-party computation / Privacy / Internet privacy / Information privacy / Entropy / Secret sharing / Data mining / Cryptography / Cryptographic protocols / Formal sciences

Poster: Differentially Private Decision Tree Learning from Distributed Data Parisa Kaghazgaran Hassan Takabi

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:26
977Data / Network architecture / Tunneling protocols / Internet protocols / Internet Key Exchange / Virtual private networks / IPsec / Check Point / Internet Security Association and Key Management Protocol / Cryptographic protocols / Computing / Computer network security

Chapter 5 Advanced VPN Concepts and Tunnel Monitoring Solutions in this chapter:

Add to Reading List

Source URL: scitechconnect.elsevier.com

Language: English - Date: 2015-03-19 08:13:14
978Internet standards / Ethernet / IPv4 / Address Resolution Protocol / Broadcast address / Communications protocol / Ethernet frame / Traceroute / IP address / Network architecture / Computing / OSI protocols

Ethernet and Diagnostic Tools The first assignment of DA2402Jonas Lundberg/Ola Flygt adapted to Java by Marcus Edvinsson maintained by Marcus Edvinsson

Add to Reading List

Source URL: homepage.lnu.se

Language: English - Date: 2009-02-17 07:21:35
979TCP/IP / Internet protocols / Streaming / Flow control / Transmission Control Protocol / Transport layer / Traffic flow / Congestion window / Network packet / Computing / Network architecture / Data

End-to-end transport protocols, TCP, congestion control, and DNS George Porter CSE 124 January 20, 2015

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-01-20 15:37:56
980One-time password / Internet protocols / HOTP / USB / USB human interface device class / Universal Serial Bus / Two-factor authentication / Human interface device / USB flash drive / Computer security / Computing / Security

The YubiKey Manual Usage, configuration and introduction of basic concepts Version: 3.4 Date: 27 March, 2015

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2015-04-06 10:43:13
UPDATE