Security architecture

Results: 5312



#Item
111Computing / Computer networking / Data management / Network architecture / Cloud storage / Data center / Distributed data storage / Software-defined networking / Cloud computing / Computer security / Application Defined Network

Research Statement for Theophilus Benson The average enterprise network operator is responsible for managing a network that secures $5 billion worth of intellectual property (McAfeeand whose poor performance can r

Add to Reading List

Source URL: users.cs.duke.edu

Language: English - Date: 2014-03-19 22:40:33
112Computing / Internet / Network architecture / Routing / Internet Standards / Computer networking / IP hijacking / Internet security / Border Gateway Protocol / Internet Routing Registry / Classless Inter-Domain Routing / Router

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

Add to Reading List

Source URL: we.riseup.net

Language: English - Date: 2011-01-17 04:39:11
113Computing / Internet / Password / Security / File hosting service / File Transfer Protocol / Network architecture

LRMP DOWNLOAD SERVICE User Guide, Data Descriptions, Order Form and Licence Agreement GMC LRMP Download Service User Guide (Version 2.4)

Add to Reading List

Source URL: www.gmc-uk.org

Language: English - Date: 2016-08-18 04:47:31
114Computing / Network architecture / Internet / Network protocols / Internet Standards / Internet protocols / Cryptographic protocols / Secure communication / Transport Layer Security / Transmission Control Protocol / Clientserver model / Session

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:10
115Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
116Software / Computing / Computer architecture / Compilers / Instruction set architectures / Programming language implementation / Machine code / GNU Compiler Collection / X86 / Assembly language / LLVM / NOP

SACK: a Semantic Automated Compiler Kit Colby T. Skeggs Applications o Rapid architecture testing o Automatically-generated architectures: o For security

Add to Reading List

Source URL: www.celskeggs.com

Language: English
117Computing / Software / BIOS / Computer architecture / Cyberwarfare / Rootkit / Firmware / Broadcom / Booting

How to develop a rootkit for Broadcom NetExtreme network cards Guillaume Delugr´e Sogeti / ESEC R&D guillaume(at)security-labs.org

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
118Computing / Network architecture / Internet / World Wide Web / Internet protocols / Hypertext Transfer Protocol / Web development / Internet security / SPDY / HTTP/2 / HTTP pipelining / WebSocket

Can SPDY Really Make the Web Faster? 1 Yehia 1 Lancaster University, UK

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2014-04-01 09:22:42
119Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
120Computing / Network architecture / Network protocols / Computer network security / Application server / Software architecture / Load balancing / Hypertext Transfer Protocol / Middlebox / Transmission Control Protocol / Web server

xOMB: Extensible Open Middleboxes with Commodity Servers James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat University of California, San Diego {jwanderson,rbraud,rkapoor,gmporter,vahdat}@cs.ucs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-02-20 11:32:27
UPDATE