Protocol

Results: 55328



#Item
271

SkypeMorph: Protocol Obfuscation for Tor Bridges Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2012-10-25 09:16:35
    272

    Written protocol for running dicty cells in the cell race chip Starvation protocol Device priming with chemoattractant Cell loading Time-lapse microscopy

    Add to Reading List

    Source URL: www.dictyworldrace.com

    Language: English - Date: 2018-03-29 19:46:03
      273

      An Ideal-Security Protocol for Order-Preserving Encoding† Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

      Add to Reading List

      Source URL: people.csail.mit.edu

      Language: English
        274

        A Hot-Patching Protocol for Repairing Time-Triggered Network Schedules Francisco Pozo April 11, 2018, RTAS 2018 Porto, Portugal

        Add to Reading List

        Source URL: 2018.rtas.org

        Language: English - Date: 2018-05-06 16:29:40
          275

          Annex 2: Protocol Implementation Conformance Statement (PICS) PICS related to performanceThe device tested is a G3-PLC FCC 3-phase data concentrator. Testing was conducted on phase 1.

          Add to Reading List

          Source URL: www.g3-plc.com

          - Date: 2018-03-18 03:48:50
            276

            Installing OBDKey Software on Windows 8 The OBDKey Windows software has been written by KBM Systems Ltd. to use the OBDKey Vehicle Data Gateway to access the vehicle’s engine ECU using OBD-II data protocol communicatio

            Add to Reading List

            Source URL: www.obdkey.com

            Language: English - Date: 2014-09-09 09:19:23
              277

              Local  Hazard  Mitigation   Plan  Quality  Protocol      

              Add to Reading List

              Source URL: mitigationguide.org

              Language: English - Date: 2015-03-26 17:48:03
                278

                Constraint Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly Shmatikov Computer Science Laboratory, SRI International, Menlo Park, CAUSA fmillen,

                Add to Reading List

                Source URL: jonmillen.com

                Language: English - Date: 2017-01-20 09:49:12
                  279

                  Modelling and Verification of Web Services Business Activity Protocol Anders P. Ravn, Jiˇr´ı Srba? , and Saleem Vighio?? Department of Computer Science, Aalborg University, Selma Lagerl¨ ofs Vej 300, DK-9220 Aalborg

                  Add to Reading List

                  Source URL: www.it.uu.se

                  Language: English - Date: 2010-12-14 04:51:50
                    280

                    Protocol verification using flows: An industrial experience John O’Leary Murali Talupur

                    Add to Reading List

                    Source URL: www.markrtuttle.com

                    Language: English - Date: 2011-09-30 00:00:00
                      UPDATE