Resource Public Key Infrastructure

Results: 58



#Item
31Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Router / Resource Public Key Infrastructure / European Network and Information Security Agency / Peering / Network architecture / Internet / Computing

Secure Routing July State-of-the-art Deployment and Impact on Network Resilience Secure routing: State-of-the-art deployment and impact on network resilience

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2010-09-28 16:55:53
32Public safety / 107th United States Congress / Counter-intelligence / Counter-terrorism / Federal Bureau of Investigation / InfraGard / National Infrastructure Protection Plan / Homeland Security Act / Patriot Act / United States Department of Homeland Security / National security / Security

Partnership is our key resource As Americans, our lifestyle, economy, and national security are supported by a complex framework of businesses and services. The central role of these critical infrastructures and key reso

Add to Reading List

Source URL: www.fedagent.com

Language: English - Date: 2014-12-21 23:18:02
33System software / Public-key cryptography / Resource Public Key Infrastructure / Rsync / Router / Stub / Routing protocols / Computing / Network architecture

RPKI rsync Download Delay Modeling Steve Kent and Kotikalapudi Sriram Email: [removed] ; [removed] March 11, 2013

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2013-03-10 17:51:39
34Public administration / Information technology management / Information Technology Infrastructure Library / Method engineering / Standards / Enterprise resource planning / E-Government / Enterprise software / Technology / Business / Open government

Strategic Initiative Descriptions Cyber Security FY2016+ Protect the State of Wisconsin’s assets and guide the enterprise in identifying business, IT and compliance elements that must be secured to achieve key objectiv

Add to Reading List

Source URL: www.doa.state.wi.us

Language: English - Date: 2014-11-20 08:57:47
35Routing / Internet standards / Internet governance / Routing Assets Database / Routing Policy Specification Language / Computer networks / Resource Public Key Infrastructure / Merit Network / Validation / Internet / Network architecture / Computing

HSARPA Cyber Security R&D

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-20 10:15:01
36Management / Disaster preparedness / Humanitarian aid / Occupational safety and health / Infrastructure / Vulnerability / Homeland security / Public safety / Emergency management / United States Department of Homeland Security

STATE OF ALASKA, DIVISION OF HOMELAND SECURITY & EMRGENCY MANAGEMENT Critical Infrastructure / Key Resource (CI/KR) Technical Assistance Planning

Add to Reading List

Source URL: www.ak-prepared.com

Language: English - Date: 2012-10-03 19:55:07
37Internet standards / Regional Internet Registries / Internet protocols / Internet governance / Asia-Pacific Network Information Centre / Internet Protocol / IPv6 / AfriNIC / Resource Public Key Infrastructure / Internet / Computing / Network architecture

Apster is the quarterly newsletter for APNIC members and the Internet community. Issue 19 - September 2006 Internet in Taiwan As APNIC holds its 22 Open Policy Meeting in Kaohsiung, we

Add to Reading List

Source URL: www.apnic.net

Language: English - Date: 2010-12-07 20:17:04
38Network architecture / Resource Public Key Infrastructure / Computing / Public key certificate / X.509 / Certificate authority / Asia-Pacific Network Information Centre / Public-key cryptography / Key management / Internet

Progress Report on Resource Certification February 2007 Geoff Huston Chief Scientist

Add to Reading List

Source URL: archive.apnic.net

Language: English
39Internet standards / Routing / Internet protocols / Domain name system / IP hijacking / Border Gateway Protocol / Resource Public Key Infrastructure / Hijacking / The Spamhaus Project / Network architecture / Internet / Computing

A Forensic Case Study on AS Hijacking: The Attacker’s Perspective Johann Schlamp Georg Carle

Add to Reading List

Source URL: www.sigcomm.org

Language: English - Date: 2013-05-09 10:49:30
40Internet standards / Routing / Regional Internet Registries / Internet protocols / Resource Public Key Infrastructure / Border Gateway Protocol / Asia-Pacific Network Information Centre / Routing Policy Specification Language / AfriNIC / Internet / Network architecture / Computing

A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms Kotikapaludi Sriram Oliver Borchert Okhee Kim Patrick Gleichmann Doug Montgomery National Institute of Standards and Technology Gaithersburg, Mary

Add to Reading List

Source URL: w3.antd.nist.gov

Language: English - Date: 2008-12-19 18:48:06
UPDATE