Secure transmission

Results: 298



#Item
101Secure Shell / Traffic flow / Computing / Information / Data / Network performance / Iperf / Transmission Control Protocol

Microsoft Word - i10_3lab.docx

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2010-11-16 20:18:24
102Secure Shell / Transmission Control Protocol / Network topology

CSE 473S – Introduction to Computer Networks Fall 2009 Lab Assignment 1 1 Preliminaries

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2009-10-10 21:39:52
103Network topology / Routing / Secure Shell / Transmission Control Protocol / Port

Microsoft Word - i_1lab.doc

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2010-10-29 20:55:58
104Internet protocols / Computer network security / Information / TCP/IP / Secure communication / Tcpcrypt / Transmission Control Protocol / Secure Shell / Wireless security / Cryptographic protocols / Computing / Data

The case for ubiquitous transport-level encryption Andrea Bittau Stanford Michael Hamburg Stanford

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-06-02 14:19:01
105System software / Rsync / Network performance / Fast And Secure Protocol / Replication / Backup / File system / Secure Shell / Transmission Control Protocol / Computing / Data synchronization / Fault-tolerant computer systems

Aspera Sync Scalable, Multidirectional Synchronization of Big Data - Over Distance WHITE PAPER WHITE PAPER

Add to Reading List

Source URL: asperasoft.com

Language: English - Date: 2014-02-11 19:22:13
106Internet protocols / Internet standards / Computer network security / Secure Shell / Port / Transmission Control Protocol / Firewall / Ssh-keygen / FTPS / Computing / Network architecture / Internet

DATA SHEET FASP™ Security Model Bulletproof security for business-critical digital assets All Aspera products have complete, builtin

Add to Reading List

Source URL: asperasoft.com

Language: English - Date: 2014-06-23 20:03:39
107Information / Cryptography / Secure multi-party computation / Key management / Communications protocol / Lookup table / Homomorphic encryption / Secret sharing / Transmission Control Protocol / Cryptographic protocols / Data / Computing

Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen1,2 and Sander Siim1,2 1 Cybernetica AS

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 10:34:14
108Secure multi-party computation / IP / Adversary model / Transmission Control Protocol / Cryptography / Mathematics / Computing / Cryptographic protocols / Applied mathematics / Analysis of algorithms

On Achieving the “Best of Both Worlds” in Secure Multiparty Computation∗ Jonathan Katz† Abstract Two settings are typically considered for secure multiparty computation, depending on

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-01-08 13:33:41
109Cryptography / Communications protocol / Data transmission / Protocols / Error detection and correction / Telecommunications engineering / Coding theory / Data / Information

Cryptanalysis of Secure Message Transmission Protocols with Feedback (Full version of the ICITS 2009 paper with the same title and authors) Qiushi Yang1,? and Yvo Desmedt1,2,?? 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-21 09:52:54
110Locomotives of the London and North Eastern Railway

Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary Kannan Srinathan∗ Arpita Patra†‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-03 12:06:52
    UPDATE