Time Protocol

Results: 1628



#Item
111Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
112

The Flooding Time Synchronization Protocol Miklós Maróti Branislav Kusy Gyula Simon

Add to Reading List

Source URL: www.isis.vanderbilt.edu

Language: English - Date: 2008-06-17 14:03:24
    113

    Network Time Protocol (NTP) Issues Troubleshooting and Debugging Guide Document ID: Contributed by Mani Ganesan and Krishna Nagavolu, Cisco TAC Engineers. Aug 17, 2013

    Add to Reading List

    Source URL: www.cisco.com

    Language: English
      114Internet protocols / World Wide Web / Computer networking / QUIC / SPDY / HTTP/2 / Transmission Control Protocol / Hypertext Transfer Protocol / Packet loss / Round-trip delay time / Micro Transport Protocol

      QUIC Quick UDP Internet Connections Multiplexed Stream Transport over UDP Presentation by

      Add to Reading List

      Source URL: www.ietf.org

      Language: English - Date: 2013-11-07 10:43:15
      115

      Micro-core processing – A time and efficient protocol Lena Wegner Ute Sass-Klaassen, Britta Eilmann, Ellen Wilderink November 2013

      Add to Reading List

      Source URL: www.streess-cost.eu

      Language: English - Date: 2016-01-12 05:47:11
        116Computing / Network architecture / Network protocols / Hypertext Transfer Protocol / World Wide Web / MIME / Email / Chunked transfer encoding / Real-Time Messaging Protocol

        HTTP - MESSAGES http://www.tutorialspoint.com/http/http_messages.htm Copyright © tutorialspoint.com HTTP is based on the client-server architecture model and a stateless request/response protocol

        Add to Reading List

        Source URL: www.tutorialspoint.com

        Language: English - Date: 2015-09-30 15:33:50
        117

        Probabilistic polynomial-time semantics for a protocol security logic? Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Vitaly Shmatikov2 , and Mathieu Turuani3 1 2

        Add to Reading List

        Source URL: www.andrew.cmu.edu

        Language: English - Date: 2016-04-07 02:02:11
          118Medicine / Clinical medicine / Cognitive disorders / Psychiatric diagnosis / Health care / RTT / Intensive care medicine / Delirium / Antiemetics / Haloperidol / Palliative care

          Delirium Screening Tools: Just- In- Time Education and Evaluation Using the EMR Implementation of an EMR based protocol for detection of delirium in elderly Medical and palliative care

          Add to Reading List

          Source URL: adgap.americangeriatrics.org

          Language: English - Date: 2015-10-29 12:59:56
          119Computing / Web development / World Wide Web / Network architecture / Network socket / Real-time web / WebSocket / Hypertext Transfer Protocol / Transmission Control Protocol

          R and Websockets Bryan W. Lewis http://paradigm4.com http://illposed.net

          Add to Reading List

          Source URL: illposed.net

          Language: English - Date: 2012-08-09 10:14:58
          120Operations research / Computing / Network performance / Business / Queueing theory / Probability theory / Computer networking / Data transmission / Transmission time / Queuing delay / Schedule / Transmission Control Protocol

          IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 10, NO. 4, AUGUSTEnergy-Efficient Packet Transmission Over a Wireless Link

          Add to Reading List

          Source URL: isl.stanford.edu

          Language: English - Date: 2004-09-20 19:09:51
          UPDATE