Protocol I

Results: 1505



#Item
81Computer access control / Hypertext Transfer Protocol / Cryptographic protocols / Password / Security / Authentication / Phishing / HTTP cookie / Cryptographic nonce / Challengeresponse authentication / SQRL / HTTPS

I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-07-05 13:35:58
82Computing / Network architecture / Internet / Network performance / Multipath TCP / Flow control / TCP congestion control / Internet protocols / Transmission Control Protocol / Internet Standards / H-TCP / Transport layer

Observing real Multipath TCP traffic Viet-Hoang Tran, Quentin De Coninck, Benjamin Hesmans, Ramin Sadre, Olivier Bonaventure {hoang.tran,quentin.deconinck,benjamin.hesmans, ramin.sadre,olivier.bonaventure}@uclouvain.be I

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2016-06-16 08:03:21
83Computing / Network architecture / Networking hardware / Computer networking / Internet protocols / 6WIND / Data Plane Development Kit / Open vSwitch / Virtual Router Redundancy Protocol / IPv6 / Network function virtualization / IPsec

S P E E DS E R I E S TurboAppliances Ÿ Throughput for cost-effec ve rou ng and

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2016-03-01 18:42:38
84

THE PROTOCOLS OF THE LEARNED ELDERS OF ZION TABLE OF CONTENTS Preface Introduction Who are the Elders? Protocol I

Add to Reading List

Source URL: www.usislam.org

Language: English
    85Computing / Inter-process communication / Software / Computer architecture / Web development / JavaScript / Hypertext Transfer Protocol / Application programming interface / Technical communication / WebSocket / Futures and promises / XMLHttpRequest

    Streams APIyouenn/calvaris What is it? • Enabling I/O processing

    Add to Reading List

    Source URL: www.webengineshackfest.org

    Language: English - Date: 2016-03-14 05:03:51
    86Transport Layer Security / Cryptographic protocols / Secure communication / Internet Standards / Internet protocols / HTTPS / FREAK

    Attacking and Proving TLS 1.3 implementations Karthikeyan Bhargavan December 2, 2015 The Transport Layer Security (TLS) protocol is widely used to provide secure channels for the Web (https), email, and Wi-Fi networks. I

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2015-12-02 09:59:52
    87

    CS/ECEAl Davis Today’s topics: •  Last lecture •  general serial I/O concepts •  more specifics on asynchronous SCI protocol

    Add to Reading List

    Source URL: www.eng.utah.edu

    Language: English - Date: 2010-03-30 12:55:48
      88

      University of California, San Diego  TRITONS ACT (Actively Caring for Tritons)    Responsible Action Protocol     I. Purpose The Responsible Action Protocol (Protocol) has been developed with the intent

      Add to Reading List

      Source URL: students.ucsd.edu

      Language: English - Date: 2015-08-13 17:29:13
        89

        Lumiprobe corporation Phone: +Email: Website: http://lumiprobe.com Protocol: SYBR Green I Staining of DNA in Gels

        Add to Reading List

        Source URL: ru.lumiprobe.com

        Language: English - Date: 2013-03-05 08:38:54
          90Software / Computing / System software / Ethernet / Windows NT kernel / Hyper-V / Windows Server / Asynchronous I/O / Device driver / QEMU / Transmission Control Protocol / Hardware virtualization

          Virtual device passthrough for high speed VM networking Stefano Garzarella Giuseppe Lettieri Luigi Rizzo

          Add to Reading List

          Source URL: info.iet.unipi.it

          Language: English - Date: 2015-03-15 11:52:49
          UPDATE