Secure transmission

Results: 298



#Item
81Internet protocols / Internet standards / Computer network security / Transmission Control Protocol / Port / User Datagram Protocol / Secure Shell / Dynamic Host Configuration Protocol / Telnet / Computing / Internet / Network architecture

Configuration of Networked Devices using iproxy Horms (Simon Horman) February 2002 http://verge.net.au/linux/iproxy/

Add to Reading List

Source URL: horms.net

Language: English - Date: 2002-03-01 22:41:22
82Internet / Internet protocols / Network architecture / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / Transmission Control Protocol / HTTP Secure / Cryptographic protocols / Secure communication / Computing

Client Server HTTPS SSL/TLS Session for SPDY This sequence diagram covers the establishment of a SSL/TLS connection for sending Google SPDY data. The protocol flow covers:

Add to Reading List

Source URL: www.eventhelix.com

Language: English - Date: 2015-03-03 14:20:22
83Avionics / Communications protocol / Data transmission / Protocols / Public-key cryptography / Transmission Control Protocol / Global Positioning System / Telecommunication / UMAC / Technology / Cryptography / Data

Secure Ranging With Message Temporal Integrity ˇ Nils Ole Tippenhauer, Kasper Bonne Rasmussen, and Srdjan Capkun Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland {tinils, kasperr, capkuns}@inf.ethz.ch

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-05 06:44:31
84Eduroam / Password / Virtual private network / Computing / Electronics / Data transmission / Computer network security / Internet privacy / Network architecture

User account for employees at UiT Administrative applications VPN portal for UiT / Secure connection to UiT

Add to Reading List

Source URL: uit.no

Language: English
85Computing / Cryptography / Communications protocol / Data transmission / Protocols / Mediation / Commitment scheme / Secure multi-party computation / Transmission Control Protocol / Data / Information / Cryptographic protocols

Collusion-Free Multiparty Computation in the Mediated Model∗ Jonathan Katz† Yehuda Lindell‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-19 12:33:08
86Radio electronics / Electronic design / Oscillators / Phase-locked loop / Transmitter / Stopwatch / ANT / Radio / Electronic engineering / Technology / Telecommunications engineering

RADIO SYSTEMS 1 SECURE AND COMPACT Completely innovative in concept, the LINKGATE radio transmission system is a state-of -the-art device for wireless transmission of timing impulses.

Add to Reading List

Source URL: www.microgate.it

Language: English - Date: 2011-01-13 03:43:09
87Network performance / EMC Isilon / OneFS distributed file system / Throughput / Transmission Control Protocol / Storage area network / Computer data storage / Transfer / Computing / Cloud computing / Fast And Secure Protocol

SOLUTION BRIEF Aspera for EMC Isilon Scale-out NAS Ultra high-speed transport and storage The explosive growth of unstructured data across virtually all

Add to Reading List

Source URL: asperasoft.com

Language: English - Date: 2014-03-11 19:55:19
88Privacy law / Law / Health informatics / Medicine / Protected health information / Medical informatics / Jumbleme / Medical billing / Health / Data privacy / Health Insurance Portability and Accountability Act

Healthcare Policies Overview Sentrion Healthcare Policies work with your information infrastructure to secure protected health information (PHI) against transmission to unauthorized recipients, as required by the Health

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-04-21 19:52:01
89Internet standards / Internet protocols / Computer network security / Internet privacy / Transmission Control Protocol / User Datagram Protocol / Dynamic Host Configuration Protocol / Port / Secure Shell / Computing / Internet / Network architecture

iproxy: Running TCP services over UDP Horms (Simon Horman) January 2002 http://verge.net.au/linux/iproxy/

Add to Reading List

Source URL: horms.net

Language: English - Date: 2002-02-28 00:02:00
90Network architecture / Internet standards / Telnet / Password / Secure Shell / SAINT / Transmission Control Protocol / File Transfer Protocol / Basic access authentication / Computing / Internet / Internet protocols

ABC Coffee ASV Vulnerability Details Report Generated: April 18, 2014 Part 1. Scan Information Scan Customer Company: ABC Coffee Shop Date scan was completed: April 17, 2014

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2014-04-22 13:49:11
UPDATE