Secure channel

Results: 85



#Item
31Wireless networking / Microphones / Wireless microphone / Sound recording and reproduction / Receiver / Shure / MIPRO / Technology / Wireless / Telecommunications engineering

SONY ENHANCES DWX SERIES DIGITAL WIRELESS MIC TECHNOLOGY New System Components Deliver Higher Level of User Flexibility, Stable and Secure Transmission, Outstanding Sound Quality and Multi-channel Operation PARK RIDGE, N

Add to Reading List

Source URL: pro.sony.com

Language: English - Date: 2014-10-27 06:26:11
32Cryptography / Quantum information science / Quantum key distribution / Quantum channel / Photon / Coherent states / Indium gallium arsenide / Decoy state / Physics / Quantum cryptography / Quantum mechanics

Provably Secure and Practical Quantum Key Distribution over 307 km of Optical Fibre Boris Korzh,1, a) Charles Ci Wen Lim,1, b) Raphael Houlmann,1 Nicolas Gisin,1 Ming Jun Li,2 Daniel Nolan,2 Bruno Sanguinetti,1 Rob Thew,

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-24 06:08:50
33Video formats / High-definition television / Serial digital interface / 1080p / Ancillary data / Secure Digital / SMPTE 292M / SMPTE 259M / Society of Motion Picture and Television Engineers / Video / Television / Terminology

- MicroVideo HDG 3X3 3 Channel s.ll/animated Logo Generator

Add to Reading List

Source URL: www.microvideo.co.uk

Language: English - Date: 2014-03-13 10:34:04
34OSI protocols / SCSI / Data / ISCSI / Virtual LAN / Fibre Channel / Storage area network / HTTP Secure / Network switch / Local area networks / Ethernet / Computing

I’m Going to Shoot the Next Person who says VLANS Presenter: Himanshu Dwivedi August 3rd, 2006 BlackHat Briefings 2006

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
35Options Clearing Corporation

THE OPTIONS CLEARING CORPORATION POLICY STATEMENT Back-Up Communication Channel to Internet Access Purpose. The Options Clearing Corporation (“OCC”) hosts and maintains a Secure Website providing Clearing Members wit

Add to Reading List

Source URL: www.optionsclearing.com

Language: English - Date: 2015-04-25 10:08:34
    36RSA / Adversary / Cryptographic primitive / Cryptography / Public-key cryptography / Side channel attack

    SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email:

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2004-12-23 06:54:05
    37Cybercrime / Domain name system / Network architecture / Domain name / Identifiers / .co / Email authentication / Domain / Phishing / Internet / Country code top-level domains / Spamming

    .BANK Open for Business MayBANK is a new, more secure Internet web domain for the banking community; an identifiable channel for trusted communications; and a place for growth and innovation. Only banks, banking t

    Add to Reading List

    Source URL: www.encirca.com

    Language: English - Date: 2015-04-28 02:29:22
    38Dolev-Yao model / Public-key cryptography / Protocol composition logic / XTR / Cryptographic primitive / Semantic security / Secure channel / Key-agreement protocol / Commitment scheme / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

    Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2007-12-18 00:37:13
    39Computer network security / Crime prevention / Electronic commerce / National security / Secure communication / Vulnerability / Side channel attack / Password / Hardware Trojan / Cyberwarfare / Security / Computer security

    University Research in Hardware Security Ruby B. Lee Princeton University HotChips Hardware Security Tutorial August 10, 2014

    Add to Reading List

    Source URL: www.hotchips.org

    Language: English - Date: 2014-08-10 23:56:02
    40Cryptography / Trusted computing / Unified Extensible Firmware Interface / Trusted Execution Technology / Trusted Platform Module / Trusted computing base / Side channel attack / Hypervisor / Tamper resistance / Computer security / Security / System software

    SECURE SYSTEMS DESIGN LEENDERT VAN DOORN CORPORATE FELLOW [removed] 1

    Add to Reading List

    Source URL: www.hotchips.org

    Language: English - Date: 2014-08-10 23:56:00
    UPDATE