Network layer

Results: 1811



#Item
171Ethernet / Computing / Network architecture / PHY / Physical Coding Sublayer / Physical layer / Physical Medium Dependent / Interpacket gap / PCI Express / Throughput / Media access control / Measuring network throughput

4948_ibm_4948_kernel_1518_3562_cdf.eps

Add to Reading List

Source URL: fireless.cs.cornell.edu

Language: English - Date: 2013-02-22 13:55:01
172Cryptography / Stream ciphers / Cryptographic protocols / RC4 / Internet Standards / Computer network security / Transport Layer Security / Block cipher mode of operation / Keystream / Wi-Fi Protected Access / E0 / Symmetric-key algorithm

A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

Add to Reading List

Source URL: tls.mbed.org

Language: English
173Internet protocols / Internet Standards / Internet security / Secure communication / Network performance / Transmission Control Protocol / Transport layer / Internet protocol suite / Out-of-order delivery / Tor / Stream Control Transmission Protocol / Hypertext Transfer Protocol

Reducing Latency in Tor Circuits with Unordered Delivery Michael F. Nowlan, David Wolinsky, and Bryan Ford Yale University Abstract Tor, the popular anonymous relay tool, incurs significant latency costs—partly due to

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-07-21 06:56:10
174Software / System software / Utility software / NuFW / Computer network security / Discontinued software / Virtual private networks / Netfilter / Intrusion detection systems / Layer 2 Tunneling Protocol / Ipchains / Firewall

Éric Leblond 44 rue Bayen ParisFRANCE Email: URL: https://home.regit.org

Add to Reading List

Source URL: home.regit.org

Language: English - Date: 2013-09-19 13:58:52
175Wireless networking / Computing / Wireless sensor network / Data transmission / Routing protocols / Routing algorithms / Link-state routing protocol / Wireless ad hoc network / Mobile ad hoc network / Transport layer / Sensor node / Routing

The Emergence of a Networking Primitive in Wireless Sensor Networks doi:

Add to Reading List

Source URL: csl.stanford.edu

Language: English - Date: 2008-06-27 12:17:27
176Computing / Network architecture / OSI protocols / Wireless networking / Telecommunications engineering / Wireless sensor network / Communications protocol / TinyOS / Computer network / Link layer / Transport layer / Data link layer

PDF Document

Add to Reading List

Source URL: sing.stanford.edu

Language: English - Date: 2014-11-10 18:30:06
177Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt / Transport Layer Security / Application security / OWASP

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
178Computing / Network architecture / Internet protocols / Computer networking / Network protocols / Network performance / Internet protocol suite / Packet loss / Transmission Control Protocol / Named data networking / Transport layer / TCP congestion control

MFTP: A Clean-Slate Transport Protocol for the Information Centric MobilityFirst Network Kai Su, Francesco Bronzino, K. K. Ramakrishnan§ and Dipankar Raychaudhuri WINLAB, Rutgers University, North Brunswick, NJ 08902, U

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:18:31
179Secure communication / Cryptographic protocols / Internet Standards / Computer network security / Transport Layer Security / HTTPS / OpenSSL / Cipher suite / Handshaking / End-to-end encryption / Middlebox / Extensible Authentication Protocol

Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-07-29 16:55:02
180Computing / Virtual private networks / Computer network security / Network architecture / Tunneling protocols / Layer 2 Tunneling Protocol / Point-to-Point Tunneling Protocol / SoftEther VPN / OpenVPN

ITServ Request for VPN Access Every field is mandatory Name: ______________________________________ ID. ___________ Tel. ___________ School/Department/Unit: _________________________Email: _____________________ Period Re

Add to Reading List

Source URL: itserv.ait.ac.th

Language: English - Date: 2012-10-23 04:58:00
UPDATE