Secure transmission

Results: 298



#Item
11Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
12Computing / Network architecture / Internet / Multihoming / Cryptographic protocols / Internet protocols / Identifier/Locator Network Protocol / IPsec / Internet protocol suite / Transmission Control Protocol

Fast,&Secure&Failover&for&IP& Saleem&Bha:& &&&Ditchaphong&PhoomikiaDssak& Ran&Atkinson&

Add to Reading List

Source URL: saleem.host.cs.st-andrews.ac.uk

Language: English - Date: 2014-10-06 15:05:30
13Computing / Computer networking / Internet Standards / Computer network security / Datakit / Telnet / Internet protocol suite / Firewall / UUCP / Simple Mail Transfer Protocol / Transmission Control Protocol / ARPANET

ches Fri Apr 20 07:46:11 EDT 1990 The Design of a Secure Internet Gateway Bill Cheswick AT&T Bell Laboratories

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 17:42:40
14Computing / Network architecture / Internet / Internet protocols / Network protocols / Network management / Cryptographic protocols / Secure communication / Transmission Control Protocol / Simple Mail Transfer Protocol / Load balancing / Hypertext Transfer Protocol

ALOHA LOAD BALANCER CHECKING THE HEALTH OF APPLICATION SERVERS “APPNOTE” #0013 ― LIST OF CHECKS IN ALOHA This application note is intended to list the main checks available in the Aloha solution to be sure of the s

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:44:16
15Security / Prevention / Biometrics / Cybercrime / E-commerce / Secure communication / Speaker recognition / Speech processing / Authentication / Password / Computer security / Transmission Control Protocol

Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:59:39
16Computing / Network architecture / Internet / Network performance / Cryptographic protocols / Secure communication / Internet protocols / Flow control / Transmission Control Protocol / Transport Layer Security / TCP congestion control / HTTPS

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
17Wireless sensor network / Wireless networking / Computing / Technology / Data transmission / Sensor node / Energy harvesting / Internet of things / Energy development / ANT / Body area network / Secure data aggregation in WSN

Energy Neutral Operation: An energy efficient methodology for wireless sensor networks Pamela Bezerra Julie McCann

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:14:03
18Secure communication / Internet Standards / Cryptographic protocols / Internet protocols / Internet security / Transport Layer Security / Cipher suite / RC4 / Transmission Control Protocol / Cryptography / Galois/Counter Mode / TLS-SRP

Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:58
19Electric power distribution / Emerging technologies / Smart grid / Electric power transmission systems / Electrical grid / Distributed generation / Virtual power plant / Grid connection / Demand response / Energy development / Solar power / Electric power transmission

Published: April 3, 2012 Position Paper The Need for a Sustainable Electricity Infrastructure for Ukraine and How to Achieve It Presented by: Peter Knazko & Bartosz Wojszczyk, GE Energy; Introduction A clean, secure, cos

Add to Reading List

Source URL: euea-energyagency.org

Language: English - Date: 2012-12-18 21:50:02
20Wireless sensor network / Wireless networking / Sensor node / Node / Routing / ANT / Kademlia / Secure data aggregation in WSN

A Novel Approach of Distributed Trust Model for Secure Transmission in WSN Mahdi Abdulkader Salem Department of Computer Science and Information Technology, Sam Higginbottom Institute of Agriculture, Technology and Scien

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-09 06:22:35
UPDATE