Protocols

Results: 23793



#Item
571Computing / Malware / Internet / Domain name system / Cyberwarfare / Internet Standards / Internet protocols / Ransomware / Infoblox / Botnet / Denial-of-service attack / Domain Name System Security Extensions

Infoblox_diamond_open_pattern

Add to Reading List

Source URL: www.infoblox.com

Language: English - Date: 2016-08-17 03:40:37
572Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
573Computing / Network architecture / OSI protocols / Media technology / Computer networking / Local area networks / Internet protocol suite / Virtual LAN / Network switch / Network layer / Firewall / Communications protocol

Affordable. Flexible. OnTarget. A Solid Technical Foundation is Critical for; Selling, Designing, Implementing and Maintaining Communications Products and Solutions. The Foundational Technology Assessment is focused on t

Add to Reading List

Source URL: cdn.westnetlearning.com

Language: English - Date: 2014-03-06 12:57:30
574Network protocols

Enhancing the Bilateral S&T Partnership with Ukraine*Advanced Innovative Approach Deliverable Title D4.22 – Report on the performance of the UA NCP system

Add to Reading List

Source URL: www.bilat-ukraina.eu

Language: English - Date: 2015-06-15 06:39:13
    575Internet / Computing / Internet protocols / Internet Engineering Task Force / IETF Administrative Oversight Committee / Subpoena / Hypertext Transfer Protocol

    Fees  Policy  for  Legal  Requests  6  September  2012     Abstract:     This  policy  imposes  standard  fees  to  produce  information  and  authenticate  d

    Add to Reading List

    Source URL: iaoc.ietf.org

    Language: English - Date: 2015-12-02 12:03:34
    576Computing / World Wide Web / Software / Hypertext Transfer Protocol / Internet protocols / Network protocols / Common Gateway Interface / HTML / Apache HTTP Server / POST / HTTP compression / Web Calendar Access Protocol

    HTTP - MESSAGE EXAMPLES http://www.tutorialspoint.com/http/http_message_examples.htm Copyright © tutorialspoint.com Example 1

    Add to Reading List

    Source URL: www.tutorialspoint.com

    Language: English - Date: 2015-09-30 15:33:55
    577Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control

    Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

    Add to Reading List

    Source URL: www.e7n.ch

    Language: English
    578Computing / Network architecture / Internet / World Wide Web / Internet protocols / Hypertext Transfer Protocol / Web development / Internet security / SPDY / HTTP/2 / HTTP pipelining / WebSocket

    Can SPDY Really Make the Web Faster? 1 Yehia 1 Lancaster University, UK

    Add to Reading List

    Source URL: www.eecs.qmul.ac.uk

    Language: English - Date: 2014-04-01 09:22:42
    579Software / Computing / Digital media / Video surveillance / Multimedia / Network protocols / Digital television / Internet television / IP camera / Real Time Streaming Protocol / ONVIF / Streaming media

    ® Luxriot VMS Software Luxriot is an open architecture Video Management System (VMS). Luxriot accepts MJPEG, MPEG4 and H.264 as well as HD and megapixel video streams

    Add to Reading List

    Source URL: www.luxriot.com

    Language: English - Date: 2016-05-08 15:59:44
    580Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

    Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

    Add to Reading List

    Source URL: www.avolio.com

    Language: English - Date: 2007-12-29 18:01:44
    UPDATE