Transmission security

Results: 1396



#Item
31Safety / Prevention / European Union / Security / Disaster preparedness / Humanitarian aid / Occupational safety and health / European Network of Transmission System Operators for Electricity / Emergency management / Smart grid / Energy policy of the European Union / Preparedness

European Distribution System Operators for Smart Grids Response to the European Commission’s public consultation on risk preparedness in the area of security of electricity supply

Add to Reading List

Source URL: www.edsoforsmartgrids.eu

Language: English - Date: 2015-10-05 06:13:16
32Communications protocol / Data transmission / Random oracle

Our Works The Technique and Concrete Protocol of Kunda and Paterson Our Contribution Our Future Research and Conclusion A Security Proof for Key Exchange Protocol

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:55
33Economy / Business / Money / Merchant services / Credit cards / E-commerce / Payment cards / Debit cards / Payment Card Industry Data Security Standard / Transaction Network Services / Visa Inc. / MasterCard

The table below summarizes the PCI DSS compliance status of Transaction Network Services’ payment transmission and processing environments globally. The table also lists the products and services associated with these

Add to Reading List

Source URL: www.tnsi.com

Language: English - Date: 2016-03-21 10:44:01
34Computing / Computer networking / Internet Standards / Computer network security / Datakit / Telnet / Internet protocol suite / Firewall / UUCP / Simple Mail Transfer Protocol / Transmission Control Protocol / ARPANET

ches Fri Apr 20 07:46:11 EDT 1990 The Design of a Secure Internet Gateway Bill Cheswick AT&T Bell Laboratories

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 17:42:40
35Computing / Network architecture / Data transmission / Flow control / Computer networking / Network protocols / Network performance / Transmission Control Protocol / Acknowledgement / Channel / Network packet / Packet loss

64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
36Security / Prevention / Biometrics / Cybercrime / E-commerce / Secure communication / Speaker recognition / Speech processing / Authentication / Password / Computer security / Transmission Control Protocol

Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:59:39
37Computer security / Computer security incident management / Transmission Control Protocol

Emergency Stop Spiral 2, take 2 Wednesday, March 17, 2010

Add to Reading List

Source URL: groups.geni.net

Language: English - Date: 2010-04-07 14:22:56
38Electronic countermeasures / Electronics / Technology / Military communications / Denial-of-service attacks / Electronic counter-countermeasure / Military technology / Denial-of-service attack / Spread spectrum / Transmission Control Protocol / Radar jamming and deception / Draft:Energy related security attacks

STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming Bruce DeBruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague Carnegie Mellon University Electrical and Computer Engineering {debruhl, yuseu

Add to Reading List

Source URL: research.owlfolio.org

Language: English - Date: 2016-04-20 11:44:16
39Economy / Finance / Stock market / Money / Corporate finance / Economy of the United Kingdom / Public limited company / United Kingdom company law / Stock / Security / Greenhalgh v Arderne Cinemas Ltd / Share transmission

    ПРЕДСТАВЛЕНИЕ ВОПРОСОВ НА ГОЛОСОВАНИЕ ВЛАДЕЛЬЦЕВ ЦЕННЫХ БУМАГTHE  COMPANIES  LAW,  CAP.  113   _____________  

Add to Reading List

Source URL: static.qiwi.com

Language: English - Date: 2016-08-18 04:20:24
40Software / Computing / Cyberwarfare / Computer network security / Internet Standards / Multi-agent systems / Spamming / Transmission Control Protocol / Skype / Botnet / Transport Layer Security / Network packet

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:50
UPDATE