Security architecture

Results: 5312



#Item
231

Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra Reporte Técnico No. CCC

Add to Reading List

Source URL: ccc.inaoep.mx

Language: English - Date: 2015-08-12 19:00:11
    232Computing / Internet / Network architecture / Internet protocols / Internet Standards / Internet security / Domain name system / Cryptographic protocols / Border Gateway Protocol / Anycast / Router / Virtual private network

    Communication Networks Spring 2016 Two weeks ago on Communication Networks Laurent Vanbever

    Add to Reading List

    Source URL: comm-net.ethz.ch

    Language: English
    233Computer architecture / Software / Computing / Operating system kernels / Linux kernel / Computer security / Control-flow integrity / Kernel / System call / Protection ring / MINIX 3 / Microkernel

    Fine-Grained Control-Flow Integrity for Kernel Software Xinyang Ge∗ , Nirupama Talele∗ , Mathias Payer† , and Trent Jaeger∗ ∗ The Pennsylvania State University

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    234Computing / Computer architecture / Computer network security / Wireless networking / IEEE 802.11 / Local area networks / Cryptographic protocols / Wireless / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Ubuntu / Cracking of wireless networks

    Connecting to the Rovernet WPA2 Secured Wireless Network with with UbuntuIntreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

    Add to Reading List

    Source URL: www.it.mtu.edu

    Language: English - Date: 2015-09-21 08:47:24
    235Internet / Computing / Internet Standards / Internet protocols / Network architecture / Domain name system / Key management / DNSSEC / Domain Name System Security Extensions

    TM DNSSEC Practice Statement 11 December 2014

    Add to Reading List

    Source URL: www.nic.philips

    Language: English - Date: 2016-06-13 20:33:54
    236

    SecretAgent® DAS 1.7 Architecture Diagram Copyright© Information Security Corp. All rights reserved. HSM HSM support, directly or via a

    Add to Reading List

    Source URL: www.infoseccorp.com.

    - Date: 2008-04-30 19:55:00
      237Computer access control / Computer architecture / Computer security / Access control / Smart cards / USB / YubiKey / CCID / Windows Server / OpenPGP card

      CSIS Enrollment Station Guide

      Add to Reading List

      Source URL: www.yubico.com

      Language: English - Date: 2016-05-13 13:11:03
      238Computing / Internet / Network architecture / Secure communication / Internet Standards / Internet security / Computer network security / Internet protocols / SoftEther VPN / Tor / HTTPS / Transport Layer Security

      Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

      Add to Reading List

      Source URL: conferences.sigcomm.org

      Language: English - Date: 2015-09-25 08:38:52
      239

      SecretAgent® DAS 1.7 HSM Proxy Architecture Diagram Copyright© Information Security Corp. All rights reserved. HSM’s PKCS#11 API HSM

      Add to Reading List

      Source URL: www.infoseccorp.com.

      - Date: 2008-04-30 20:01:00
        240Computing / Internet / Network architecture / Domain name system / Internet Standards / Internet protocols / Computer networking / Computer network security / Root name server / Network address translation / Content delivery network / Name server

        Communication Networks Spring 2016 Last week on Communication Networks Laurent Vanbever

        Add to Reading List

        Source URL: comm-net.ethz.ch

        Language: English - Date: 2016-05-08 12:55:33
        UPDATE