Secure transmission

Results: 298



#Item
161Actor model / Country codes / Writing / ISO 3166-1 alpha-2 / Vehicle registration plates of the United Kingdom / Identification / Transmission Control Protocol / International Article Number

‘Talent Transfer’ in Sport: High Level Coach Insight Introduction Rebecca K. Dickinson, C.J. Mallett, J. Gulbin, & J. Weissensteiner School of Human Movement Studies, The University of Queensland (UQ) & The Australia

Add to Reading List

Source URL: secure.ausport.gov.au

Language: English - Date: 2015-02-04 18:28:03
162Network packet / Key generation / Symmetric-key algorithm / Cryptographic protocols / IPsec / Secure multicast / Cryptography / Advanced Encryption Standard / Transmission Control Protocol

CITI Technical Report[removed]The 10 Mbps Advanced Packet Vault Charles J. Antonelli, Kevin W. Co man, and J. Bruce Fields [removed], [removed], [removed] Abstract

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2002-01-16 12:26:58
163Network architecture / Cyberwarfare / Firewall / Packet capture / Computer security / Transmission Control Protocol / Throughput / Secure multicast / Computer network security / Computing / Data security

CITI Technical Report 98−5 The Packet Vault: Secure Storage of Network Data C.J. Antonelli [removed] M. Undy

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 1999-01-07 15:19:50
164Electric power distribution / Electric power transmission systems / Emerging technologies / Smart grid / Electrical grid / American Public Power Association / Smart meter / Electric utility / Electric power transmission / Energy / Electric power / Electromagnetism

Summary of Testimony by Joel Ivy, Lakeland Electric, on “The 21st Century Electricity Challenge: Ensuring a Secure, Reliable, and Modern Electricity System” The American Public Power Association (APPA), based in Wash

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2015-03-03 10:01:05
165Electric power transmission systems / Electrical grid / Energy storage / Emerging technologies / Smart grid / Ontario electricity policy / Electric power / Energy / Electric power distribution

Opening Statement of the Honorable Fred Upton Subcommittee on Energy and Power Hearing on “The 21st Century Electricity Challenge: Ensuring a Secure, Reliable and Modern Electricity System” March 4, 2015 (As Prepared

Add to Reading List

Source URL: energycommerce.house.gov

Language: English - Date: 2015-03-04 09:16:00
166Electric power distribution / Energy economics / Electrical grid / Energy industry / Smart grid / Electric power / Energy / Electric power transmission systems

Opening Statement of the Honorable Ed Whitfield Subcommittee on Energy and Power Hearing on “21st Century Electricity Challenge: Ensuring a Secure, Reliable, and Modern Electricity System” March 4, 2015 (As Prepared

Add to Reading List

Source URL: energycommerce.house.gov

Language: English - Date: 2015-03-04 09:20:32
167Network architecture / URI schemes / Internet standards / Cryptographic protocols / Secure communication / HTTP pipelining / Transmission Control Protocol / Hypertext Transfer Protocol / HTTP Secure / Computing / Internet / HTTP

http2 explained Background, the protocol, the implementations and the future http://daniel.haxx.se/http2/ by Daniel Stenberg

Add to Reading List

Source URL: daniel.haxx.se

Language: English - Date: 2015-02-18 01:39:54
168Emerging technologies / Smart grid / Electric power distribution / Demand response / Sustainable energy / Electrical grid / Energy conservation / Smart grid policy in the United States / Smart grid in the United States / Electric power / Energy / Electric power transmission systems

Policy Framework for a 21st Century: Enabling our Secure Energy Future

Add to Reading List

Source URL: energy.gov

Language: English - Date: 2011-08-10 11:21:47
169Computer network security / Denial-of-service attacks / Cryptographic protocols / Secure communication / BitTorrent / Denial-of-service attack / Transmission Control Protocol / Man-in-the-middle attack / HTTP Secure / Computing / Software / Cryptography

EE122 Section 12 – Security Question 1 – Crackdown on P2P In 2007, a large broadband provider in the US disrupted end users’ BitTorrent connections with a layer-4 Denial-of-Service (DoS) attack. The provider identi

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2013-12-10 23:49:52
170Transmission Control Protocol / Secure multi-party computation / Cryptography / Cryptographic protocols / Public-key cryptography

Private Matching Li, Yaping, J.D. Tygar, and Joseph M. Hellerstein IRB-TR[removed]February, 2004

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:48:06
UPDATE