Security architecture

Results: 5312



#Item
801Computer architecture / Internet privacy / Crypto-anarchism / Virtual private network / Tunneling protocols / Mobile virtual private network / Mediated VPN / Computer network security / Computing / Network architecture

Tire Systems Virtual Private Network Protect your network from unauthorized intruders. Securing your data has never been so simple, affordable, and easy to use.

Add to Reading List

Source URL: www.asatire.com

Language: English - Date: 2011-09-07 07:40:19
802Computer network security / Data / Internet protocols / Tunneling protocols / Internet standards / IPsec / Internet Key Exchange / Internet Security Association and Key Management Protocol / RADIUS / Computing / Cryptographic protocols / Network architecture

Trust Management for IPsec Matt Blaze AT&T Labs - Research John Ioannidis AT&T Labs - Research

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:19:57
803Internet / Cyberoam / Unified threat management / Security appliance / Application firewall / Stateful firewall / Virtual private network / IPsec / Proxy server / Computer network security / Computing / Network architecture

CR25iNG Future-ready Future-ready Security for SOHO/ROBO networks

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:43:00
804Computer architecture / Network architecture / Cryptographic protocols / Virtual private networks / Internet privacy / OpenVPN / Cisco Systems VPN Client / IPsec / Internet Key Exchange / Computer network security / Computing / Tunneling protocols

TheGreenBow VPN Client Pro User Guide Contact: Website: www.thegreenbow.com Property of TheGreenBow© - Sistech SA 2015

Add to Reading List

Source URL: www.thegreenbow.fr

Language: English - Date: 2014-10-28 11:06:31
805Network architecture / Network performance / Cryptographic software / Tor / Onion routing / Network congestion / Proxy server / Denial-of-service attack / Transmission Control Protocol / Internet privacy / Computing / Internet

A Practical Congestion Attack on Tor Using Long Paths Nathan S. Evans Colorado Research Institute for Security and Privacy University of Denver Email:

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2009-06-11 20:30:09
806Internet / Network architecture / Internet standards / Data security / Unix / Inetd / Firewall / Rlogin / Filesystem Hierarchy Standard / Computing / Computer network security / Internet protocols

Public/Private/Wireless Information Security A blue print for safeguarding sensitive information Mark Rader and Professor J. D. Birdwell Laboratory for Information Technologies 439 Science & Engineering Research Facility

Add to Reading List

Source URL: www.fwtk.org

Language: English - Date: 2015-05-17 11:35:12
807Cryptography / Biometrics / ARM architecture / Embedded microprocessors / Fingerprint recognition / Qualcomm / Fingerprint / Snapdragon / Password / Security / Fingerprints / Identification

Fingerprint tech from Qualcomm uses ultrasonic sound waves

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-27 15:51:25
808Network protocols / Tunneling protocols / Multiprotocol Label Switching / Border Gateway Protocol / Label switching / Quality of service / Routing / Label Distribution Protocol / MPLS-TP / Network architecture / Computing / Internet standards

Malicious MPLS Policy Engine Reconnaissance A. Almutairi1 and S. Wolthusen1,2 1 Information Security Group Royal Holloway, University of London, UK

Add to Reading List

Source URL: www.critis2013.nl

Language: English - Date: 2013-09-23 18:08:02
809Crypto-anarchism / Internet privacy / Network architecture / Virtual private network / IPad / Apple Inc. / Computer architecture / Computing / Computer network security / Multi-touch

PDF Document

Add to Reading List

Source URL: carleton.ca

Language: English - Date: 2013-07-02 08:14:11
810Server / Server hardware / Subnetwork / Subnet / ISCSI / Network architecture / OSI protocols / Computing

Trading off Security in a Service Oriented Architecture Garret Swart? , Benjamin Aziz† , Simon N. Foley‡ , and John Herbert‡ ? IBM Almaden Research Center, 650 Harry Road, San Jose, CA, USA

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2005-05-20 03:03:27
UPDATE