Protocols

Results: 23793



#Item
851Human rights / Identity management / Law / Privacy / Internet privacy / Private information retrieval / Communications protocol

Abstract Implementation and Evaluation of Privacy-Preserving Protocols Felipe Saint-Jean Antonijevic 2010

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2010-08-16 09:48:18
852Cryptography / Blinding

Efficient Uncondi,onally Secure Comparison and Privacy Preserving Machine Learning Classifica,on Protocols Bernardo David Rafael Dowsley Raj KaE

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
853Routing protocols / Internet Standards / Internet protocols / Routing algorithms / Computer networking / Border Gateway Protocol / Path vector protocol / Routing / Distance-vector routing protocol / Open Shortest Path First / Interior gateway protocol / IS-IS

University “Politehnica” of Bucharest Faculty of Automatic Control and Computers Vrije University of Amsterdam Faculty of Sciences

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-08-25 10:52:42
854KPN / Network protocols / Getronics / Base / Next-generation network

Supplementary Conditions of KPN International For the provision of International Data and ICT Services © KPN B.V., October 2011 Version 1.3.1

Add to Reading List

Source URL: www.kpn-international.nl

Language: English - Date: 2012-05-07 10:37:44
855Routing / Computer networking / Internet protocols / Ethernet / Forwarding information base / Router / IP multicast / Distance Vector Multicast Routing Protocol / Hop / Forwarding plane / Reverse path forwarding

SAVE: Source Address Validity Enforcement Protocol Jun Li Jelena Mirkovic Mengqiu Wang

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2006-07-13 15:01:14
856Domain name system / Internet Standards / Internet protocols / Domain name / Identifiers / Country code top-level domains / Domain hijacking

Application Form for Information Modification of Important Domain Names Type of Application(mandatory) □Application for Modifying Registrant ID □Application for Modifying DNS information

Add to Reading List

Source URL: cnnic.com.cn

Language: English - Date: 2015-01-27 07:31:58
857Borders / Frontier / American frontier

NoUNION OF SOVIET SOCIALIST REPUBLICS and AFGHANISTAN Treaty (with annexes and Protocols) concerning the regime of the Soviet-Afghan state frontier. Signed at Moscow,

Add to Reading List

Source URL: www.cawater-info.net

Language: English - Date: 2009-06-23 15:00:00
858Cryptographic hash functions / Graz University of Technology / Hashing / Institute for Applied Information Processing and Communications / Error detection and correction / Cryptography / IAIK-JCE

A Case Against Currently Used Hash Functions in RFID Protocols

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-18 01:05:54
859Tunneling protocols / Point-to-Point Tunneling Protocol / Internet protocols / Internet Standards / Virtual private networks / Computer network security / Layer 2 Tunneling Protocol / Point-to-Point Protocol daemon

Microsoft Word - Configure PPTP Server.doc

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:45:38
860Network address translation / Web development / Network protocols / WebRTC / Videotelephony / WebRTC Gateway / Voice over IP / Real-time communication / Real-time Transport Protocol / Interactive Connectivity Establishment / NAT traversal / Traversal Using Relays around NAT

WSQI™ Certification Become a WebRTC School Qualified Integrator (WSQI™) supported by the Telecommunications Industry Association (TIA) Exam Objectives The WebRTC School Qualified Integrator (WSQI™) is designed to t

Add to Reading List

Source URL: www.thesipschool.com

Language: English - Date: 2015-03-14 20:08:25
UPDATE