Key System

Results: 6849



#Item
391Internet / Domain name system / Computing / Network architecture / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Name server / Time to live

./by-Rlt--prod-all-zn-lt-ttl.eps

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English - Date: 2009-12-09 11:21:49
392

DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits Jovan Goliæ System on Chip, Telecom Italia Lab, Italy CHES 2003, Cologne, Germany

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2008-01-12 08:52:34
    393Computing / Internet / Domain name system / Network architecture / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / Name server / Root name server

    Validating Caching Resolver Wouter Wijngaards (NLnet Labs) http://www.nlnetlabs.nl/ © May 2008 Stichting NLnet Labs

    Add to Reading List

    Source URL: unbound.nlnetlabs.nl

    Language: English - Date: 2008-05-19 08:09:35
    394

    2138 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 12, DECEMBER 2013 Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy

    Add to Reading List

    Source URL: sefcom.asu.edu

    Language: English - Date: 2014-11-20 12:03:52
      395

      Knox Box Rapid Entry System For Commercial Properties The Birmingham Fire Department has adopted the Knox Box Rapid Entry System to reduce unnecessary damage caused when forcing entry into a building when a key is not re

      Add to Reading List

      Source URL: www.enjoybirmingham.com

      Language: English - Date: 2014-08-02 05:29:19
        396

        Using Simulation to Explore Distributed Key-Value Stores for Extreme-Scale System Services Ke Wang Abhishek Kulkarni

        Add to Reading List

        Source URL: www.cs.indiana.edu

        Language: English - Date: 2013-09-10 17:50:03
          397Automated theorem proving / Usability / KeY / Automated reasoning / Proof assistant / Reasoning system / Formal verification / E theorem prover / Isabelle / Software testing / Geoff Sutcliffe / Software verification

          PDF Document

          Add to Reading List

          Source URL: ceur-ws.org

          Language: English - Date: 2012-07-10 09:41:34
          398Computing / Internet / Software / Internet Standards / Internet protocols / Domain name system / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / Unbound / Installation / Start menu

          PDF Document

          Add to Reading List

          Source URL: unbound.nlnetlabs.nl

          Language: English - Date: 2010-11-08 06:57:17
          399DNSSEC / Domain Name System Security Extensions / Domain name system / Key management / Scheduling

          PDF Document

          Add to Reading List

          Source URL: unbound.nlnetlabs.nl

          Language: English - Date: 2008-01-02 07:02:11
          400Routing / Internet Standards / Computer networking / Internet protocols / Border Gateway Protocol / Resource Public Key Infrastructure / Route filtering / Router / Autonomous system

          PDF Document

          Add to Reading List

          Source URL: security.cs.georgetown.edu

          Language: English - Date: 2012-08-16 08:16:20
          UPDATE