Protocols

Results: 23793



#Item
761

Copyright 2009 Placer County Water Agency Communication and Participation Protocols Agenda.doc PLACER COUNTY WATER AGENCY Middle Fork American River Project Relicensing

Add to Reading List

Source URL: relicensing.pcwa.net

- Date: 2009-07-14 19:06:41
    762Domain name system / Internet Standards / Internet protocols / Cyberwarfare / Computer network security / Domain Name System Security Extensions / Denial-of-service attack / Dan Kaminsky / Cloudmark / Internet security / Computer security / Comparison of DNS server software

    Telecom/Datacom Market Fundamental Drivers

    Add to Reading List

    Source URL: www.cloudmark.com

    Language: English - Date: 2014-11-13 13:40:39
    763Network protocols / Internet Standards / Internet Protocol / Mobile IP / Domain name system / Proxy Mobile IPv6 / Mobile technology / Triangular routing / IP address / Dynamic DNS / Dynamic Host Configuration Protocol / IPv6

    Dynamic Home Agent Reassignment in Mobile IP Yu Chen Terrance Boult

    Add to Reading List

    Source URL: www.vast.uccs.edu

    Language: English - Date: 2003-12-24 21:58:16
    764Network protocols / Diagrams / Specification and Description Language / Protocol stack

    SDL Implementations for Wireless Sensor Networks Incorporation of PragmaDev’s RTDS into the Deterministic Protocol Stack BiPS Tobias Braun, Dennis Christmann, Reinhard Gotzhein, Alexander Mater {tbraun, christma, gotzh

    Add to Reading List

    Source URL: sdl-forum.org

    Language: English - Date: 2014-10-14 21:27:47
    765Secure communication / Public-key cryptography / Key management / Cryptographic protocols / Internet Standards / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Elliptic curve DiffieHellman / Key size / Key / Client certificate

    Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

    Add to Reading List

    Source URL: iaoc.ietf.org

    Language: English - Date: 2016-02-04 15:25:45
    766Networking hardware / Server appliance / Internet protocols / Internet Standards / Domain name system / Resolver / The Spamhaus Project / Router / Residential gateway

    DNS Record Injection Vulnerabilities in Home Routers Kyle Schomp†, Tom Callahan†, Michael Rabinovich†, Mark Allman†‡ †Case Western Reserve University ‡International Computer Science Institute

    Add to Reading List

    Source URL: kyle.schomp.info

    Language: English - Date: 2016-05-31 23:40:45
    767Country codes / Module:PropertyPlot / Vehicle registration plates of the Philippines

    Bird Area Survey Standard Operating Procedures USGS Western Ecological Research Station SFBE Suggested citation: US Geological SurveyBird area survey standard operating procedures. Unpublished protocols. USGS, We

    Add to Reading List

    Source URL: tidalmarshmonitoring.org

    Language: English - Date: 2012-06-27 15:24:51
    768Wireless networking / Computer network security / IEEE 802.11 / Wi-Fi / IEEE 802.1X / Cryptographic protocols

    How to Connect Your Android Device to the “KSU” WiFi Network 1. On the Home screen, click on your MENU icon or button. The screen below will appear at the bottom of your phone. Then select the Settings icon.

    Add to Reading List

    Source URL: ksuhousing.kennesaw.edu

    Language: English - Date: 2015-09-01 10:59:13
    769Internet protocols / Computer networking / Cache / File sharing / File sharing networks / Cache algorithms / Time to live / Information-centric networking / Peer-to-peer / Open Shortest Path First / Least frequently used / Hypertext Transfer Protocol

    Trace-Driven Analysis of ICN Caching Algorithms on Video-on-Demand Workloads Yi Sun⊗ , Seyed K. Fayaz† , Yang Guo⊗ , Vyas Sekar† Yun Jin , Mohamed Ali Kaafar∗ , Steve Uhlig◦ ⊗

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2014-12-01 16:58:21
    770Internet protocols / Computer network security / Network address translation / Network protocols / Internet Protocol / Internet protocol suite / Application-level gateway / Resource Reservation Protocol / Transmission Control Protocol / Application layer / IPv6 / Traversal Using Relays around NAT

    NAT Working Group Holdrege INTERNET-DRAFT Communications Category: Informational Srisuresh

    Add to Reading List

    Source URL: iaoc.ietf.org

    Language: English - Date: 2016-06-21 11:58:17
    UPDATE