Secure transmission

Results: 298



#Item
231Computer data / Computer networking / Electronic commerce / Electronic data interchange / Health Insurance Portability and Accountability Act / File format / Computing / Data / Information

FRONT END PROCESSING Electronic Data Interchange (EDI) Transaction Receipt and Delivery: Secure file transmission methods to exchange electronic data include:

Add to Reading List

Source URL: www.cgsbpo.com

Language: English - Date: 2014-05-02 11:40:47
232Cryptographic protocols / Fault-tolerant computer systems / Consensus / Secure multi-party computation / Communications protocol / Transmission Control Protocol / IP / FO / Theoretical computer science / Data / Applied mathematics

Distributed Consensus in the Presence of Sectional Faults S. Amitanand" I. Sanketh- K. Srinathant*

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:28:05
233Technology / Emerging technologies / Electric power distribution / Energy economics / Smart grid / United States Department of Energy / Sustainable energy / Demand response / Electrical grid / Energy / Electric power / Electric power transmission systems

A P OL IC Y F R A M E WOR K F OR T H E 21st CEN T U RY GR I D: Enabling Our Secure Energy Future J U N E 2 011

Add to Reading List

Source URL: m.whitehouse.gov

Language: English - Date: 2011-06-13 08:41:24
234Cyberwarfare / HTTP Secure / Secure communication / Vulnerability / HTTP cookie / Password / Transmission Control Protocol / Cloud computing / Web 2.0 / Computing / HTTP / Computer security

Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow Shuo Chen Rui Wang, XiaoFeng Wang, Kehuan Zhang Microsoft Research

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-07-09 18:37:16
235Data transmission / Networking hardware / Transmission Control Protocol / Traffic flow / Unidirectional network / Universal Serial Bus / Communications protocol / Datagram / Acknowledgement / Data / Information / Computing

Owl Computing Technologies R OWL SECURE ACKNOWLEDGEMENT ENGINE

Add to Reading List

Source URL: www.owlcti.com

Language: English - Date: 2012-04-12 13:50:00
236Internet standards / Internet / Network management / Trivial File Transfer Protocol / OPDS / Syslog / Transmission Control Protocol / Shared resource / Secure Shell / Computing / Information technology management / Internet protocols

Owl Computing Technologies R Curtiss Wright Scientech R*Time Support

Add to Reading List

Source URL: www.owlcti.com

Language: English - Date: 2012-11-08 13:17:22
237Computer hardware / RS-232 / Universal Serial Bus / Data terminal equipment / Flow control / MPDS4 / Unidirectional network / Data circuit-terminating equipment / Computer port / Data transmission / Technology / Computing

Owl Miniaturized Perimeter Defense Solution (MPDS - RS232) Owl Miniaturized Perimeter Defense Solution (MPDS - RS232) In order to meet the increasing demand for secure serial communications, Owl has adapted

Add to Reading List

Source URL: www.owlcti.com

Language: English - Date: 2014-04-23 11:10:36
238Internet / Internet standards / Stream Control Transmission Protocol / Secure Shell / Transport layer / Transmission Control Protocol / TCP tuning / Port / OpenSSH / Network architecture / Internet protocols / Computing

SSH over SCTP — Optimizing a Multi-Channel Protocol by Adapting It to SCTP Robin Seggelmann, Michael T¨uxen, Erwin P. Rathgeb Abstract—Secure Shell (SSH) is a multi-channel security protocol running over the Transmi

Add to Reading List

Source URL: www.advances.et.put.poznan.pl

Language: English - Date: 2013-12-23 05:44:57
239Man-in-the-middle attack / Public-key cryptography / DCF Interframe Space / Network packet / Transmission Control Protocol / Computing / Information / Technology / IEEE 802.11 / Bluetooth

Secure In-Band Wireless Pairing Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, and Dina Katabi Massachusetts Institute of Technology A BSTRACT Alliance does not fully address WiFi security. DiffieHellman’s key

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
240Computing / Internet standards / Cryptographic protocols / Secure communication / Stream Control Transmission Protocol / Streaming / Datagram Transport Layer Security / Datagram Congestion Control Protocol / Transport Layer Security / Internet protocols / Network architecture / Data

Design and Implementation of SCTP-aware DTLS R. Seggelmann1 , M. T¨uxen2 and E. Rathgeb3 1 M¨unster University of Applied Sciences, Steinfurt, Germany - [removed] 2

Add to Reading List

Source URL: robin-seggelmann.de

Language: English - Date: 2011-02-25 05:00:02
UPDATE