Secure transmission

Results: 298



#Item
61Computing / Internet protocols / Secure communication / HTTP / HTTP Secure / Port / Communications protocol / Transmission Control Protocol / ARPANET / Data / Cryptographic protocols / Information

Communication over Challenged Networks Keith Winstein Stanford University Secure Internet of Things Project Workshop Stanford University

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2014-11-10 17:36:13
62Network protocols / Mobile IP / Internet Protocol / Router / Transmission Control Protocol / Communications protocol / Routing / Internet protocol suite / Network architecture / Computing / Internet

USENIX Summer 1994 Technical Conference Boston, MA, 6-10 June 1994 Secure Short-Cut Routing for Mobile IP Trevor Blackwell, Kee Chan, Koling Chang, Thomas Charuhas, James Gwertzman, Brad Karp, H. T. Kung, W. David Li, Do

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 1999-11-15 17:24:02
63Computing / Cryptographic hash function / Information / Hash tree / Transmission Control Protocol / Data / Hash function / IP traceback / Error detection and correction / Hashing / Cryptography

Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks∗ Sangwon Hyun, Peng Ning, An Liu North Carolina State University Abstract

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:10
64Network protocols / Internet protocols / Secure multicast / Data transmission / IP multicast / Transmission Control Protocol / Public-key cryptography / Message authentication code / Communications protocol / Data / Information / Network architecture

Efficient and Secure Source Authentication for Multicast Adrian Perrig  Ran Canetti

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:22:53
65OSI protocols / Dynamic Source Routing / Ad hoc On-Demand Distance Vector Routing / Wireless ad-hoc network / Routing / Packet forwarding / Transmission Control Protocol / Packet loss / MORE protocol / Wireless networking / Network architecture / Technology

Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, Thomas F. La Porta Department of Computer Science and Engineering Pennsylvania State

Add to Reading List

Source URL: www.enck.org

Language: English
66Internet protocols / Internet standards / Windows Server / Secure Shell / Transmission Control Protocol / Server / Windows / Portmap / Communications protocol / Computing / System software / Internet

NSDMiner: Automated Discovery of Network Service Dependencies Arun Natarajan, Peng Ning, Yao Liu Sushil Jajodia

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-01-11 16:13:03
67Cryptography / Quantum complexity theory / PP / Secure multi-party computation / Secure two-party computation / Verifiable secret sharing / Function / Transmission Control Protocol / Cryptographic protocols / Mathematics / Applied mathematics

Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay Jonathan Katz

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2008-07-05 10:54:06
68Computing / Computer keyboard / Bluetooth / Transmission Control Protocol / Universal Serial Bus / Secure communication / Communications protocol / Keystroke logging / Technology / Telecommunications engineering / Wireless

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
69Wireless networking / Microphones / Wireless microphone / Sound recording and reproduction / Receiver / Shure / MIPRO / Technology / Wireless / Telecommunications engineering

SONY ENHANCES DWX SERIES DIGITAL WIRELESS MIC TECHNOLOGY New System Components Deliver Higher Level of User Flexibility, Stable and Secure Transmission, Outstanding Sound Quality and Multi-channel Operation PARK RIDGE, N

Add to Reading List

Source URL: pro.sony.com

Language: English - Date: 2014-10-27 06:26:11
70Internet protocols / Transmission Control Protocol / Secure multi-party computation / Public-key cryptography / Email / Peer-to-peer / Port / Cryptography / Cryptographic protocols / Computing

PDF Document

Add to Reading List

Source URL: galois.com

Language: English - Date: 2014-08-27 14:21:33
UPDATE