Security architecture

Results: 5312



#Item
971Routing protocols / Routing / Computer network security / Internet protocols / Internet standards / Forwarding plane / Router / Forwarding information base / Routing control plane / Network architecture / Internet / Computing

IMPLEMENTING ADDRESS ASSURANCE IN THE INTEL IXP ROUTER Michael Burns, Gregory Prier, Jelena Mirkovic, Peter Reiher UCLA {mburns, greg, sunshine, reiher}@cs.ucla.edu

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-10-28 20:48:50
972Federated identity / System software / Eduroam / Security Assertion Markup Language / TERENA / Digital identity / Authentication / Identity provider / Service-oriented architecture / Identity management / Identity / Computer security

APAN Task Force proposal for Federation Deployment in the Asia Pacific Region Version 1.0 Prepared by Terry Smith Australian Access Federation

Add to Reading List

Source URL: www.apan.net

Language: English - Date: 2014-12-08 03:29:01
973Internet protocols / Computing / NLnet / Domain Name System Security Extensions / NSD / DNS root zone / BIND / Root name server / Name server / Internet / Domain name system / Network architecture

© 2002 Stichting NLnet Labs Stichting NLnet Labs Annual Report 2001

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:51
974Internet protocols / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Name server / TSIG / Domain name system / Internet / Network architecture

A Security Evaluation of DNSSEC with NSEC3∗ Jason Bau Stanford University Stanford, CA, USA Abstract

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-05 02:10:22
975Internet protocols / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / BIND / Name server / Domain name system / Internet / Network architecture

Security Advanced Protocol and Domain Name System Security Extension Services COMPANY OVERVIEW Founded in 1944, Parsons

Add to Reading List

Source URL: www.parsons.com

Language: English - Date: 2015-02-12 19:14:56
976Domain name system / Internet protocols / Computing / Network architecture / Internet standards / Domain Name System Security Extensions / OpenDNSSEC / Rollover / Trust anchor / Internet / Public-key cryptography / Key management

Flexible and Robust Key Rollover in DNSSEC Yuri Schaeffer, Benno Overeinder, and Matthijs Mekking NLnet Labs, Amsterdam, The Netherlands Email: {yuri,benno,matthijs}@NLnetLabs.nl Abstract—DNSSEC security extensions ma

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2012-03-28 10:36:44
977Computing / Domain Name System Security Extensions / Unbound / NSD / NLnet / OpenDNSSEC / Name server / BIND / Root name server / Domain name system / Internet / Network architecture

Annual Report 2012 For an Open Internet Annual Report 2012

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2013-05-30 05:05:45
978Computing / Internet protocols / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / NLnet / Unbound / NSD / Internet / Domain name system / Network architecture

Annual Report 2009 Colophon This document was prepared with the OpenOffce and NeoOffce software using the OASIS open document type. Typeface: Helvetica Neue and Gill Sans.

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2010-06-02 04:40:52
979Transmission Control Protocol / Network packet / Maximum segment size / Streaming / TCP/IP / Computer network security / Internet protocols / TCP congestion avoidance algorithm / IPv6 packet / Network architecture / Computing / Data

NOVELL CERTIFIED PROFESSIONAL Laura Chappell Inside the TCP Handshake Editor’s Note: For more information about network analysis techniques and uses, attend Laura Chappell’s “Introduction to Network Analysis” (se

Add to Reading List

Source URL: www.novell.com

Language: English - Date: 2000-03-15 02:00:00
980Internet protocols / Internet standards / Multihoming / Stream Control Transmission Protocol / Streaming / Computer network security / Transport layer / Transmission Control Protocol / Firewall / Network architecture / Internet / Computing

Basic Protocols 25 Figure 2.3: These are phase diagrams of the sequence number generators for four operating systems. The lower right shows a correct implementation of RFC 1948 sequence number generation (by FreeBSD 4.6

Add to Reading List

Source URL: www.wilyhacker.com

Language: English - Date: 2004-11-16 15:11:46
UPDATE