Secure transmission

Results: 298



#Item
51Electromagnetism / Electric power transmission systems / Emerging technologies / Smart grid / Smart meter / Demand response / Electrical grid / Smart grid policy in the United States / Smart grid in the United States / Electric power / Energy / Electric power distribution

Smart Grid Technology What You Need to Know •  Time and again, smart meters (or advanced meters) have been proven to be SAFE, RELIABLE, ACCURATE AND TECHNOLOGICALLY SECURE. •  Smart meter systems PROTECT CONSUMER

Add to Reading List

Source URL: www.aect.net

Language: English - Date: 2015-01-14 20:50:15
52A10 Networks / Denial-of-service attack / HTTP Secure / Computing / Transmission Control Protocol / Cyberwarfare / Security / Load balancing / Computer network security / Cryptographic protocols / Secure communication

4 REASONS you need a HIGH PERFORMANCE ADC

Add to Reading List

Source URL: www.a10networks.com

Language: English - Date: 2015-03-10 18:51:23
53Network architecture / Internet standards / Telnet / Transmission Control Protocol / Portmap / Secure Shell / Port / Ident / Netstat / Internet protocols / Computing / Internet

Lecture 21: Buffer Overflow Attack Lecture Notes on “Computer and Network Security” by Avi Kak () April 2, 2015 3:58pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-02 15:59:28
54Universal Serial Bus / USB flash drive / Secure Digital / RS-232 / Card reader / Parity bit / Computer hardware / Computing / Data transmission

SerialGhost Module User’s Guide SerialGhost Module 2 GB

Add to Reading List

Source URL: www.keelog.com

Language: English - Date: 2013-06-17 08:19:51
55Network architecture / Internet protocol suite / Telnet / Port / Transmission Control Protocol / Application layer / Communications protocol / Secure Shell / NicheStack TCP/IPv4 / Computing / Data / Internet protocols

Microsoft Word - embedded_ethernet_intro_final.doc

Add to Reading List

Source URL: www.digikey.com

Language: English - Date: 2011-01-11 11:24:02
56Internet protocols / Internet standards / Communications protocol / Data transmission / Protocols / Computer network security / SOCKS / Secure Shell / Data / Computing / Information

Inter-Client Exchange Library - X Consortium Standard

Add to Reading List

Source URL: www.x.org

Language: English - Date: 2012-06-06 02:43:17
57Network architecture / Internet standards / RADIUS / Transport Layer Security / Diameter / RadSec / Port / Transmission Control Protocol / SOCKS / Internet protocols / Computing / Internet

October 19, 2012 Radiator RadSec a secure, reliable

Add to Reading List

Source URL: www.open.com.au

Language: English - Date: 2013-12-29 18:25:31
58Computer network security / Network architecture / Internet privacy / Cyberwarfare / Network performance / Proxy server / Port / Transmission Control Protocol / Secure Shell / Computing / Internet protocols / Internet

Attachment 3 Observation by the Internet Fixed-Point Monitoring System (TALOT2) for NovemberTo General Internet Users According to the Internet Fixed-Point Monitoring System (TALOT2), 86,568 unwanted (one-sided

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-23 07:51:49
59Network performance / Covert channel / Steganography / Overt channel / Measuring network throughput / Transmission Control Protocol / IPv4 / Network packet / Time to live / Computer architecture / Computing / Network architecture

CCHEF – Covert Channels Evaluation Framework User Manual Version 0.1 Sebastian Zander {} May 21, 2008 Abstract Communication is not necessarily made secure by the use of encryption alone. The mere ex

Add to Reading List

Source URL: caia.swin.edu.au

Language: English - Date: 2008-05-20 22:39:30
60Secure multi-party computation / Zero-knowledge proof / Standard model / IP / Random oracle / Communications protocol / Commitment scheme / NP / Transmission Control Protocol / Cryptography / Cryptographic protocols / Secure two-party computation

How To Play Almost Any Mental Game Over The Net — Concurrent Composition via Super-Polynomial Simulation Boaz Barak∗ Department of Computer Science Princeton University Princeton, New Jersey

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:49:36
UPDATE