Secure transmission

Results: 298



#Item
281Internet / Novell GroupWise / IBM Lotus Notes / Proof of delivery / Mail / Message transfer agent / De-Mail / Secure messaging / Email / Computer-mediated communication / Computing

RPost Registered E-mail Services Category Other – Registered E-mail Services, Secure File Transmission, and Electronic Signatures Best Fit

Add to Reading List

Source URL: www.accountingsoftwareworld.com

Language: English - Date: 2012-09-28 13:16:14
282Cryptographic protocols / Computing / Network architecture / Public-key cryptography / Domain name system / Domain Name System Security Extensions / Online Certificate Status Protocol / Transmission Control Protocol / HTTP Secure / Internet protocols / Internet / Internet standards

Eric Osterweil! Danny McPherson! Lixia Zhang! More%moving%parts?% •  Should%we%measure%how%many%moving%parts%our%

Add to Reading List

Source URL: www.potaroo.net

Language: English - Date: 2012-11-14 04:49:11
283Secret sharing / Public-key cryptography / Transmission Control Protocol / XTR / Communications protocol / Cryptography / Cryptographic protocols / Internet privacy

Secure Real-time User Preference Collection for Broadcast Scheduling Xuhua Ding, Shuhong Wang,Baihua Zheng, School of Information Systems Singapore Management University Email: {xhding,shwang,bhzheng}@smu.edu.sg Abstract

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2006-06-20 04:15:38
284Telecommunications engineering / Technology / Photonics / Fiber-optic communications / Interference / Optical hybrid / Phase-shift keying / Optical amplifier / Optical fiber / Optics / Data transmission / Optical devices

Microsoft Word - Secure Optical Communications 6.0.doc

Add to Reading List

Source URL: www.celight.com

Language: English - Date: 2014-01-01 15:39:31
285Internet / Internet standards / Cryptographic protocols / Secure communication / Electronic commerce / Transport Layer Security / Transmission Control Protocol / Stream Control Transmission Protocol / Cipher suite / Internet protocols / Network architecture / Computing

Version 1.0 Robin Seggelmann ([removed]) License: UVM, CC-BY-ND In this document the Datagram Transport Layer Security (DTLS) protocol, a modifcation of the Transmission Control Protocol (TCP) for unrelia

Add to Reading List

Source URL: sctp.fh-muenster.de

Language: English - Date: 2011-05-13 04:25:13
286HTTP / Network protocols / Cryptographic protocols / Secure communication / Transmission Control Protocol / HTTP persistent connection / Session / Internet protocols / Hypertext Transfer Protocol / Computing / Network architecture / Data

httperf Web Workload Generator Quickstart Guide Written By: Theodore Bullock[removed]WWW2007 Web Tools Developer Track

Add to Reading List

Source URL: www.comlore.com

Language: English - Date: 2010-08-20 02:13:14
287Internet protocols / Secure communication / Electronic commerce / Transport Layer Security / Cipher suite / Advanced Encryption Standard / Transmission Control Protocol / Elliptic curve cryptography / CryptGenRandom / Cryptography / Pseudorandom number generators / Cryptographic protocols

On the Practical Exploitability of Dual EC in TLS Implementations Stephen Checkoway1, Matthew Fredrikson2, Ruben Niederhagen3, Matthew Green1, Tanja Lange3, Thomas Ristenpart2, Daniel J. Bernstein3, 4 Jake Maskiewicz5, a

Add to Reading List

Source URL: dualec.org

Language: English - Date: 2014-04-07 12:09:11
288Health / Medicine / Avian influenza / Influenza A virus / Influenza / Iowa State University College of Veterinary Medicine / Global spread of H5N1 / Transmission and infection of H5N1 / Influenza A virus subtype H5N1 / Epidemiology / Veterinary medicine

Microsoft PowerPoint - Secure Turkey.USAHA[removed]Compatibility Mode]

Add to Reading List

Source URL: www.usaha.org

Language: English - Date: 2012-11-19 22:15:06
289Technology / Electronics / Electromagnetic compatibility / Twisted pair / Ethernet over twisted pair / Optical fiber / Yuma Proving Ground / Ethernet / Electronic engineering / Cables

PRE-EXISTING UTP CABLES USED FOR VIDEO TRANSMISSION ON US ARMY BASE YUMA, AZ - The US Army Base at Yuma Proving Grounds in Arizona had a requirement to secure four hub areas using CCTV cameras for surveillance. Video fr

Add to Reading List

Source URL: www.nitek.net

Language: English - Date: 2010-09-29 21:28:36
290Information / Firewall / Transmission Control Protocol / Denial-of-service attack / Communications protocol / Computer security / Wireless security / Computer network security / Computing / Data

A Secure Plan Michael Hicks1 and Angelos D. Keromytis1 Distributed Systems Lab

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2002-06-05 14:11:05
UPDATE