Secure transmission

Results: 298



#Item
291Distributed generation / University of Strathclyde / Electrical grid / Technology / Electric power transmission systems / Energy / Smart grid

REALISING SECURE OPERATION OF THE SMART GRID A PhD STUDENTSHIP WITH INTERNATIONAL COOPERATION UNIVERSITY OF STRATHCLYDE (UK) with TNO (NL) and the ENERGY TECHNOLOGY PARTNERSHIP Building on previous research cooperation a

Add to Reading List

Source URL: www.strath.ac.uk

Language: English - Date: 2014-06-01 02:51:28
292Data privacy / Health Insurance Portability and Accountability Act / Law / Security / Medical informatics / Health informatics / Protected health information / Privacy / Paper shredder / Health / Privacy law / Ethics

FA C T S H E E T The Health Insurance Portability and Accountability Act (HIPAA) Enacted in 1995, HIPAA requires that healthcare organizations across the US be responsible for the secure electronic transmission

Add to Reading List

Source URL: www.ashredahead.com

Language: English - Date: 2012-12-06 16:26:50
293Computing / Stream Control Transmission Protocol / Datagram Transport Layer Security / Secure Shell / Datagram Congestion Control Protocol / Transport layer / Transmission Control Protocol / User Datagram Protocol / Multihoming / Internet protocols / Network architecture / Internet

SCTP Strategies to Secure End-To-End Communication

Add to Reading List

Source URL: duepublico.uni-duisburg-essen.de

Language: English
294Internet / Internet standards / Internet protocols / Transmission Control Protocol / MIME / Simple Mail Transfer Protocol / Internet media type / Port / Secure Electronic Transaction / Computing / Email / OSI protocols

External Interface Guide to

Add to Reading List

Source URL: www.maithean.com

Language: English - Date: 2005-01-16 19:31:33
295Computer network security / Hacking / Software testing / Vulnerability / Email / Communications protocol / Transmission Control Protocol / Computing / Computer security / Data

! !

Add to Reading List

Source URL: www.deep-secure.com

Language: English - Date: 2013-04-22 10:12:06
296Cryptographic software / Internet privacy / Tor / Traffic analysis / Secure Shell / Packet capture / Cyberwarfare / Transmission Control Protocol / Computer network security / Computing / Software

Traffic Analysis of Anonymity Systems

Add to Reading List

Source URL: etd.lib.clemson.edu

Language: English - Date: 2010-09-29 12:16:27
297Data / TCP/IP stack fingerprinting / Network Time Protocol / Time / Horology / Transmission Control Protocol / Device fingerprint / Clock skew / P0f / Computing / Internet / Computer network security

Versions of this paper, copyright the IEEE, appear in IEEE Symposium on Security and Privacy 2005, IEEE Computer Society Press, May 2005 and IEEE Transactions on Dependable and Secure Computing, 2(2), 2005. This is the full version.

Add to Reading List

Source URL: kursovaya.googlecode.com

Language: English - Date: 2007-11-28 19:55:18
298Internet / Internet standards / Remote administration software / Transmission Control Protocol / Secure Shell / Telnet / Port / X Window System / Network socket / Computing / Internet protocols / Network architecture

PDF Document

Add to Reading List

Source URL: mosh.mit.edu

Language: English - Date: 2012-04-05 12:53:45
UPDATE