Secure Computing

Results: 5296



#Item
791Network protocols / Mobile IP / Internet Protocol / Router / Transmission Control Protocol / Communications protocol / Routing / Internet protocol suite / Network architecture / Computing / Internet

USENIX Summer 1994 Technical Conference Boston, MA, 6-10 June 1994 Secure Short-Cut Routing for Mobile IP Trevor Blackwell, Kee Chan, Koling Chang, Thomas Charuhas, James Gwertzman, Brad Karp, H. T. Kung, W. David Li, Do

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 1999-11-15 17:24:02
792Computing / Telecommunications engineering / Sensor node / Wireless ad-hoc network / Routing algorithms / Wireless networking / Technology / Wireless sensor network

Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks An Liu, Peng Ning Department of Computer Science North Carolina State University Raleigh, NC 27695, USA

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:09
793Backup software / Acronis Secure Zone / Acronis True Image / Acronis / Backup / Windows Recovery Environment / Software / Computing / Microsoft Windows

DATASHEET ACRONIS® BACKUP FOR PC BEST BACKUP FOR LAPTOPS OR DESKTOPS Acronis Backup for PC is built around state-of-the-art imaging technology, allowing you to create a disk-image backup, or

Add to Reading List

Source URL: acronis.cz

Language: English - Date: 2014-09-26 07:29:31
794Computing / Hacking / Spamming / Electronic commerce / Secure communication / Denial-of-service attack / Zero-day attack / Vulnerability / Attack / Computer network security / Cyberwarfare / Computer security

Infrastructure Security 1. Infrastructure Security The PlugX RAT Used in Targeted Attacks In this report, we discuss the PlugX RAT used in targeted attacks, and look at examples of

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:06
795Information technology management / Data security / Security information and event management / Secure communication / Network management / Security event manager / Syslog / Integrated Digital Enhanced Network / Computer security / Security / Computing

DATASHEET iCONNECT IBM i Event Monitoring with SIEM Integration

Add to Reading List

Source URL: static.helpsystems.com

Language: English - Date: 2014-02-04 11:45:36
796Technology / Ubiquitous computing / Wireless / Surveillance / Authentication protocol / Cryptographic nonce / Automatic identification and data capture / Radio-frequency identification / Human–computer interaction

1 Securing Low-cost RFID Systems: an Unconditionally Secure Approach Basel Alomair a , Loukas Lazos b , and Radha Poovendran a a

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-04-26 12:59:27
797Electronics / Computer network security / Computer security / Data security / Wireless networking / Fax / Information security / Password / Wired Equivalent Privacy / Technology / Computing / Email

Secure Systems Editor: S.W. Smith, Pretending that Systems Are Secure

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2006-03-16 13:02:25
798Computer security / Virtual private network / Network administrator / UT-VPN / Cisco Systems VPN Client / Computer network security / Computing / Cyberwarfare

Microsoft Word - Interim_Secure_Remote_Access_Project_Report.rtf

Add to Reading List

Source URL: www.itcom.itd.umich.edu

Language: English - Date: 2007-11-15 14:39:27
799

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. X, NO. X, 1 Time-Delayed Broadcasting for Defeating Inside Jammers

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2014-08-12 11:48:56
    800Software / File system / NTFS / Network File System / Server / Inode / Computing / System software / Network file systems

    Secure Untrusted Data Repository (SUNDR) Jinyuan Li, Maxwell Krohn∗, David Mazi`eres, and Dennis Shasha NYU Department of Computer Science Abstract SUNDR is a network file system designed to store data

    Add to Reading List

    Source URL: www.cs.nyu.edu

    Language: English - Date: 2006-10-10 04:45:29
    UPDATE