Security domain

Results: 1374



#Item
721Computing / Routing / ASCII art / Classless Inter-Domain Routing / IP address / IPv4 / Block cipher / Transmission Control Protocol / Pseudorandom permutation / Network architecture / Internet / Internet standards

Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme Jun Xu Jinliang Fan Mostafa H. Ammar College of Computing Georgia Institute of Technology Atlanta, GA

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2005-07-12 02:12:02
722Computer security / Computing / Email / Computer-mediated communication / Yahoo! / DomainKeys Identified Mail / Vouch by Reference / Authentication / Email authentication / Spam filtering / Cryptographic protocols

Pilot project proposal: AffiL Affiliated domain names for email trust http://mipassoc.org/affil

Add to Reading List

Source URL: mipassoc.org

Language: English - Date: 2009-04-28 10:27:57
723IP2Location / IP address / Internet / Domain name / Identification / Internet privacy / Computer network security / .ip / Network architecture / Geolocation / Domain name system

IP2LOCATION™ IP-COUNTRY-REGION-CITY-LATITUDELONGITUDE-ISP-DOMAIN DATABASE DATA FILE SPECIFICATIONS Product: IP2Location™ IP-Country-Region-City-LatitudeLongitude-ISP-Domain Database [DB8] File Name: IP2Location_IP_Co

Add to Reading List

Source URL: www.ip2location.com

Language: English - Date: 2014-07-11 04:02:38
724Network architecture / Domain Name System Security Extensions / Name server / Dan Kaminsky / PROTECT IP Act / DNS spoofing / Comparison of DNS server software / Domain name system / Internet / Computing

Security and Other Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill May 2011 Authors:

Add to Reading List

Source URL: domainincite.com

Language: English - Date: 2011-05-26 11:10:44
725Recruitment / Security / Criminal record / Domain name / Government / Law / Background check / Employment / Law enforcement

Background Report for Jeff Goolsby Is This You? Claim Your Profile Feedback Here are the order numbers associated with your purchase. Your credit/debit card

Add to Reading List

Source URL: folio.nzz.ch

Language: English - Date: 2014-10-02 08:50:25
726Network architecture / Domain Name System Security Extensions / Stop Online Piracy Act / Dan Kaminsky / Name server / DNS hijacking / BIND / Domain name system / Internet / Computing

December 9th, 2011 The Honorable Patrick Leahy U.S. Senate Chairman, Committee on the Judiciary 224 Dirksen Senate Office Building Washington, DC 20510

Add to Reading List

Source URL: www.circleid.com

Language: English - Date: 2011-12-11 18:54:21
727Economic history / Land management / Land reform / Marxist theory / Eminent domain / Environment / Food security / Food and Agriculture Organization / Real estate appraisal / Food politics / Food and drink / Land use

10 Compulsory acquisition of land and compensation ISSN[removed]

Add to Reading List

Source URL: ftp.fao.org

Language: English - Date: 2009-05-08 10:25:53
728Emergency management / Homeland security / Intelligence Reform and Terrorism Prevention Act / Homeland Security Act / Biodefense / US Commission on National Security/21st Century / Maritime domain awareness / Homeland defense / 9/11 Commission / National security / United States Department of Homeland Security / Government

P1: TIX JWBS059-Alperen January 15, [removed]:3

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-26 16:18:22
729Computing / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Hardware security module / BIND / DNS root zone / Name server / Domain name system / Internet / Network architecture

www.t hales-esecurity.com THALES DELIVERS HIGH ASSURANCE SIGNING SOLUTION TO ENHANCE SECURITY FOR BIND • Mitigate threats to the DNS by implementing ISC BIND support for DNSSEC

Add to Reading List

Source URL: www.isc.org

Language: English - Date: 2014-04-14 17:03:52
730Computing / Internet protocols / Internet standards / Name server / Traceroute / Border Gateway Protocol / Computer network security / DNS spoofing / Internet / Domain name system / Network architecture

Internet Sibilla: Utilizing DNS for Delay Estimation Service ∗ Keon Jang, DK Lee, Sue Moon

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2008-11-02 01:40:02
UPDATE