Network architecture

Results: 18731



#Item
591Computing / Network architecture / Internet protocols / Secure communication / World Wide Web / Computer networking / Transport Layer Security / QUIC / Proxy server / SPDY / HTTPS / Hypertext Transfer Protocol

The Cost of the “S” in HTTPS David Naylor? , Alessandro Finamore† , Ilias Leontiadis‡ , Yan Grunenberger‡ , Marco Mellia† , Maurizio Munafò† , Konstantina Papagiannaki‡ , and Peter Steenkiste? ? Carnegi

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:14
592Computing / Network file systems / Computer architecture / Inter-process communication / Server Message Block / Computer storage devices / SMB / File server / Path

Microsoft Word - G drive for Mac.doc

Add to Reading List

Source URL: support.okstate.edu

Language: English - Date: 2015-11-20 10:57:15
593Computing / Network architecture / Internet / Internet Standards / File Transfer Protocol / Password / Nakula / Login

Handout Nakula & Antareja Incident Lars Molske, Damian Nowak 5.5th Bieleschweig Workshop Bielefeld, June

Add to Reading List

Source URL: www.rvs.uni-bielefeld.de

Language: English - Date: 2005-06-15 07:43:38
594Computing / Routing protocols / Network architecture / Internet / Internet Standards / Internet protocols / Computer networking / Border Gateway Protocol / Routing / Vector space / Communications protocol / Path vector protocol

Abstract Foundations of Inter-Domain Routing Vijay Ramachandran 2005 Inter-domain routing protocols establish best-effort connectivity between the independently administered networks that form the Internet. Because of th

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2005-06-14 14:56:00
595Computing / Wireless networking / Network architecture / Internet / Computer networking / Network protocols / Wireless ad hoc network / Vehicular ad hoc network / Geocast / Mobile ad hoc network / Routing protocol / Routing

Eur. Transp. Res. Rev: 36 DOIs12544ORIGINAL PAPER Design and simulation of a collision notification application

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2016-01-29 07:37:36
596Computing / Computer architecture / Security engineering / Computer network security / Dynamic Host Configuration Protocol / Network service / Windows / Computer security

SECURITY COMPLIANCE MANAGEMENT THE ELEMENTAL COMPLIANCE SYSTEM Managing security in ever-changing enterprise networks requires that compliance officers and IT security managers continuously measure how well networked co

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
597Computing / Network architecture / Internet / Network performance / Cryptographic protocols / Secure communication / Internet protocols / Flow control / Transmission Control Protocol / Transport Layer Security / TCP congestion control / HTTPS

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
598Network architecture / Local loop / Fiber-optic communications / Broadband / Fiber to the x / Telephony / Computing / Technology / Electronics / Fiber to the premises by country

Fibre to the Home Council Europe Media Update: July 2016l be held in April 2016, where elections for the board of dd. New FTTH Council Europe President Ronan Kelly discusses the state of the European FTTH market and more

Add to Reading List

Source URL: www.symposium.ftthcouncil.eu

Language: English - Date: 2016-07-13 04:55:06
599Ethernet / Gigabit Ethernet / Category 5 cable / Computing / Optical fiber / Network architecture / Equipment / Fibre to the office / ISO/IEC 11801

_____________________________________________________________________________________________________________ Mechanical and Electrical Engineers • Since 1933 COMMUNICATIONS / ELECTRONIC SECURITY PROJECTS Manning Regi

Add to Reading List

Source URL: www.wlc-kc.net

Language: English - Date: 2013-11-14 18:25:54
600Ethernet / Computing / Network architecture / Computer networks / Supercomputers / Computer buses / Routing / Network switch / InfiniBand / Forwarding information base

Ensuring Deadlock-Freedom in Low-Diameter InfiniBand Networks Timo Schneider Otto Bibartiu

Add to Reading List

Source URL: htor.inf.ethz.ch

Language: English - Date: 2016-06-22 16:56:09
UPDATE