Secure transmission

Results: 298



#Item
31Internet protocols / Secure communication / Internet Standards / Transmission Control Protocol / Relay / Tor / Transport layer / Internet Relay Chat flood / HTTPS / Denial-of-service attack / Quality of service / Internet Relay Chat

IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2014-09-10 17:17:22
32Computing / Internet / Network architecture / Internet protocols / Secure communication / Dark web / Internet security / Tor / Onion routing / Traffic analysis / Proxy server / Transmission Control Protocol

Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:49:00
33

File Transmission Utilizing Encrypted Box.com Why we use Box.com. fpamed partners with Box.com to make case collaboration easier, more accessible, and secure. Any file uploaded or downloaded to or from Box is encrypted u

Add to Reading List

Source URL: www.fpamed.com

Language: English - Date: 2015-05-06 07:40:54
    34Cryptography / Cryptographic protocols / Transport Layer Security / Public-key cryptography / Wireless / Secure communication / Man-in-the-middle attack / Bluetooth / Key-agreement protocol / HTTPS / Password / Transmission Control Protocol

    PDF Document

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:14
    35Computing / Coding theory / Error detection and correction / IP multicast / Secure multicast / Transmission Control Protocol / Password authentication protocol / Reed–Solomon error correction / Communications protocol / Information / Data / Internet protocols

    Multicast Authentication in Fully Adversarial Networks Anna Lysyanskaya Roberto Tamassia Nikos Triandopoulos Brown University Department of Computer Science

    Add to Reading List

    Source URL: www.cs.bu.edu

    Language: English - Date: 2009-01-20 23:46:12
    36Mobile telecommunications / Text messaging / SMS / Technology / Mobile technology / Wireless

    “We chose Skebby because unlike its competitors, it provides the HTTPS protocol which guarantees secure transmission of medical information” Challenge presented Uma Innovation develops innovative, effective IT

    Add to Reading List

    Source URL: static.skebby.it

    Language: English - Date: 2013-02-06 07:25:44
    37Internet standards / Software testing / Communications protocol / Data transmission / Protocols / Robustness principle / Len Sassaman / Internet Protocol / Transmission Control Protocol / Computing / Data / Information

    SECURE SYSTEMS Editors: Patrick McDaniel, | Sean W. Smith, A Patch for Postel’s Robustness Principle Len Sassaman | Katholieke Universiteit Leuven

    Add to Reading List

    Source URL: langsec.org

    Language: English - Date: 2012-04-12 20:39:00
    38Cryptography / Distance-bounding protocol / IP / NP / Alice and Bob / Formal verification / Challenge-response authentication / The Verifier / Transmission Control Protocol / Theoretical computer science / Cryptographic protocols / Applied mathematics

    Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

    Add to Reading List

    Source URL: naveen.ksastry.com

    Language: English - Date: 2013-06-08 15:25:49
    39MIFARE / Telecommunications engineering / Wireless / Near field communication / NXP Semiconductors / FeliCa / Mbed microcontroller / ISO/IEC 14443 / Crypto-1 / Technology / ISO standards / Electronic engineering

    NXP Near Field Communication (NFC) for handheld devices and POS terminals PN532 Making secure connectivity easy NXP Semiconductors’ controller IC PN532 is a highly integrated transmission module

    Add to Reading List

    Source URL: www.nxp.com

    Language: English - Date: 2012-05-08 01:36:52
    40Computer security / Denial-of-service attack / Transmission Control Protocol / Traffic flow / Deep packet inspection / Secure Shell / Sliding window protocol / Port knocking / Deep content inspection / Computer network security / Computing / Cyberwarfare

    Flow-based Brute-force Attack Detection Martin Draˇsar, Jan Vykopal Masaryk University Institute of Computer Science Botanick´a 68a, Brno, Czech Republic Philipp Winter

    Add to Reading List

    Source URL: www.cs.kau.se

    Language: English - Date: 2014-05-26 09:37:41
    UPDATE