Proxy servers

Results: 95



#Item
31PRIVACY-PRESERVING COMMUNICATION PROTOCOLS FOR AUTHENTICATED LOCATION-BASED SERVICES IN MOBILE NETWORKS by Qin Zhang

PRIVACY-PRESERVING COMMUNICATION PROTOCOLS FOR AUTHENTICATED LOCATION-BASED SERVICES IN MOBILE NETWORKS by Qin Zhang

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-12-14 00:21:23
32Obroni Computer Club – Networking and Web servers Joachim Breitner November 7,thIt ist time to leave the sixties and go to modern computer times, and look

Obroni Computer Club – Networking and Web servers Joachim Breitner November 7,thIt ist time to leave the sixties and go to modern computer times, and look

Add to Reading List

Source URL: www.joachim-breitner.de

Language: English - Date: 2014-10-06 15:51:37
33Performance Analysis of TLS Web Servers Cristian Coarfa, Peter Druschel and Dan S. Wallach Department of Computer Science Rice University Abstract TLS is the protocol of choice for securing today’s ecommerce and online

Performance Analysis of TLS Web Servers Cristian Coarfa, Peter Druschel and Dan S. Wallach Department of Computer Science Rice University Abstract TLS is the protocol of choice for securing today’s ecommerce and online

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:16:24
34Cryptographic software / Tor / Computing / Computer file / System software / Proxy servers / Internet privacy / Software

Version in use 18 Aug 08 lb Timescapes Anonymisation Guidelines These guidelines are intended to be used by all members of the Timescapes programme and all affiliates of that programme. They have been created from seve

Add to Reading List

Source URL: www.timescapes.leeds.ac.uk

Language: English - Date: 2014-04-04 12:21:53
35Fast Web Servers  Cover story Alternative servers and Apache techniques

Fast Web Servers Cover story Alternative servers and Apache techniques

Add to Reading List

Source URL: www.linux-magazine.com

Language: English
36On Defining a Role for Demand−Driven Surrogate Origin Servers Mark Nottingham <> Akamai Technologies San Mateo, CA, USA or

On Defining a Role for Demand−Driven Surrogate Origin Servers Mark Nottingham <> Akamai Technologies San Mateo, CA, USA or "Reverse Proxy" mode, where the device is configured to cache and forward traffi

Add to Reading List

Source URL: www.mnot.net

Language: English - Date: 2000-05-30 18:28:31
37Mix Operator's Agreement

Mix Operator's Agreement

Add to Reading List

Source URL: anon.inf.tu-dresden.de

Language: English - Date: 2004-03-04 05:41:54
38Cache Privacy in Named-Data Networking Gergely Acs∗ ,# , Mauro Conti† ,#,+ , Paolo Gasti‡ ,# , Cesar Ghali§ , Gene Tsudik§ ∗ INRIA † University of Padua ‡ New York Institute of Technology § University of C

Cache Privacy in Named-Data Networking Gergely Acs∗ ,# , Mauro Conti† ,#,+ , Paolo Gasti‡ ,# , Cesar Ghali§ , Gene Tsudik§ ∗ INRIA † University of Padua ‡ New York Institute of Technology § University of C

Add to Reading List

Source URL: camera.crysys.hit.bme.hu

Language: English - Date: 2013-04-10 09:15:50
39Ingenieurbüro David Fischer AG | A Company of the Apica Group http://www.proxy-sniffer.com Handling of

Ingenieurbüro David Fischer AG | A Company of the Apica Group http://www.proxy-sniffer.com Handling of "Dynamically-Exchanged Session Parameters" Version 5.0 English Edition

Add to Reading List

Source URL: www.apicasystem.com

Language: English - Date: 2015-03-05 07:25:57
40How Low Can You Go: Balancing Performance with Anonymity in Tor John Geddes1 , Rob Jansen2 , and Nicholas Hopper1 1  University of Minnesota, Minneapolis, MN

How Low Can You Go: Balancing Performance with Anonymity in Tor John Geddes1 , Rob Jansen2 , and Nicholas Hopper1 1 University of Minnesota, Minneapolis, MN

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2013-05-06 18:02:20