Secure transmission

Results: 298



#Item
171Queueing theory / Traffic generation model / Secure Shell / Traffic analysis / Measuring network throughput / Transmission Control Protocol / Management / Information technology management / Traffic classification / Network performance / Teletraffic / Analysis

Preventing SSL Traffic Analysis with Realistic Cover Traffic (extended abstract) ∗ 1

Add to Reading List

Source URL: www.sigsac.org

Language: English - Date: 2009-10-16 09:07:36
172Secure multi-party computation / Communications protocol / RSA / Transmission Control Protocol / Cryptography / Cryptographic protocols / Public-key cryptography

private_matching_springer.pdf

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:42:25
173

Huihong Technologies Limited Http: www.HuihongFiber.com E2000 Fiber Optic Adapters E2000 fiber optic adapters features Secure transmission of high bit-rate protocols

Add to Reading List

Source URL: www.huihongfiber.com

- Date: 2014-10-24 05:46:46
    174Transmission Control Protocol / Password / Replay attack / Cyberwarfare / Computing / Computer security / Computer network security / Internet protocols / Internet standards / Advanced Encryption Standard / EMC Corporation / SecurID

    [removed] Weaknesses in SecurID by [removed] This paper was composed for Secure Networks Inc. as research for a commercial

    Add to Reading List

    Source URL: www.tux.org

    Language: English - Date: 1997-08-01 00:33:00
    175Communications protocol / Data transmission / Protocols / Interface / X Window System / Secure Digital / Computing / Software / Data

    Microsoft Word - large_AWS_project.doc

    Add to Reading List

    Source URL: ftp1.digi.com

    Language: English - Date: 2008-02-29 17:47:30
    176Data / Cryptographic protocols / Secure communication / Computer network security / Transport Layer Security / Transmission Control Protocol / IPsec / Transport layer / Man-in-the-middle attack / Computing / Internet protocols / Network architecture

    NETWORK SECURITY EE122 Section 12 QUESTION 1 ABRUPT TERMINATION!

    Add to Reading List

    Source URL: www-inst.eecs.berkeley.edu

    Language: English - Date: 2013-12-10 23:52:15
    177Network architecture / Internet standards / Secure Shell / Telnet / Transmission Control Protocol / Firewall / File Transfer Protocol / Rlogin / Ettercap / Internet / Computing / Internet protocols

    Detecting Backdoors Yin Zhang and Vern Paxson∗ Abstract Backdoors are often installed by attackers who have compromised a system to ease their subsequent return to the system. We consider the problem of identifying a l

    Add to Reading List

    Source URL: www.cs.utexas.edu

    Language: English - Date: 2006-04-11 12:45:48
    178Communications protocol / Stepping Stones / Secure Shell / Computing / Data / Information / Transmission Control Protocol

    Detecting Stepping Stones Yin Zhang and Vern Paxson Abstract The problem of detecting stepping stones was first addressed in a ground-breaking paper by Staniford-Chen and

    Add to Reading List

    Source URL: www.cs.utexas.edu

    Language: English - Date: 2002-07-10 21:56:02
    179Cryptographic protocols / Secure communication / Networks / Load balancing / Network management / Routing / Multilayer switch / Application firewall / Transmission Control Protocol / Computing / Network architecture / Internet

    BRIDGING THE GAP FOR APPLICATION DELIVERY. AV X D ATA S H E E T AVX10650 VIRTUALIZED APPLICATION DELIVERY CONTROLLER

    Add to Reading List

    Source URL: www.arraynetworks.com

    Language: English - Date: 2015-01-29 16:19:31
    180Secure Shell / Netcat / Scapy / Keystroke logging / Transmission Control Protocol / Software / System software / Computing

    Conte nt s in De ta il Foreword by Charlie Miller xv

    Add to Reading List

    Source URL: www.nostarch.com

    Language: English - Date: 2014-11-14 20:21:44
    UPDATE