Transport layer

Results: 2091



#Item
201Computing / Network architecture / Internet protocols / Units of information / Data / Transmission Control Protocol / Communications protocol / Transport layer / Best-effort delivery / Network packet

Now, it’s your turn …to design a Internet protocol I’m asking you to develop a reliable transport protocol (sitting at L4)

Add to Reading List

Source URL: comm-net.ethz.ch

Language: English - Date: 2016-03-03 06:11:02
202Cryptography / Public-key cryptography / Cryptocurrencies / Key management / Bitcoin / Transport Layer Security / Blockchain / X.509 / Key / Ethereum / Man-in-the-middle attack / Unique key

Decentralized Public Key Infrastructure A White Paper from Rebooting the Web of Trust by (alphabetical by last name) Christopher Allen, Arthur Brock, Vitalik Buterin, Jon Callas, Duke Dorje, Christian Lundkvist, Pavel

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
203Cryptographic software / Hardware virtualization / Heartbleed / Internet security / Transport Layer Security / OpenSSL / Hypervisor / Hyper-V / Protection ring / Second Level Address Translation / Rootkit / Operating system

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2015-08-16 21:09:13
204Computing / Network architecture / Computer networking / Internet Standards / Internet protocols / OSI protocols / Transmission Control Protocol / Transport layer / Internet protocol suite / Internet Protocol / Communications protocol / Quality of service

bundle layer vs Internet layers

Add to Reading List

Source URL: ipnsig.org

Language: English - Date: 2015-09-17 13:18:44
205Cryptography / Public key infrastructure / Public-key cryptography / Key management / Cryptographic protocols / Transport Layer Security / Public key certificate / X.509 / DocuSign / Online Certificate Status Protocol / SCVP / Authentication

    CP  (Certificate  Policy)  /  Certification   Practice  Statement  (CPS)      

Add to Reading List

Source URL: trust.docusign.com

Language: English - Date: 2016-06-01 20:59:26
206Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate authority / Public key certificate / Online Certificate Status Protocol / Root certificate / X.509 / CA/Browser Forum

Interoperability Guidelines for Digital Signature Certificates issued under Information Technology Act VersionMay 2016

Add to Reading List

Source URL: cca.gov.in

Language: English
207Physical oceanography / Oceanography / Aquatic ecology / Fisheries science / Oceans / Thermohaline circulation / Antarctic Circumpolar Current / Thermocline / Ocean current / Mixed layer / Upwelling / Ekman transport

Closure of the meridional overturning circulation through Southern Ocean upwelling

Add to Reading List

Source URL: climate-dynamics.org

Language: English - Date: 2016-04-17 06:43:22
208Fluid dynamics / Continuum mechanics / Physics / Partial differential equations / Turbulence / Aerodynamics / Transport phenomena / Convective Boundary Layer / Boundary layer / Boussinesq approximation / Large eddy simulation / Turbulence kinetic energy

Cumulant expansions for atmospheric flows

Add to Reading List

Source URL: climate-dynamics.org

Language: English - Date: 2016-02-20 11:40:31
209Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Secure communication / Key server / Man-in-the-middle attack / Public key certificate / Certificate authority / Anonymity / HTTPS

Verifying Public Keys without Trust: How Anonymity Can Guarantee Data Integrity Lachlan J. Gunn, Andrew Allison, Derek Abbott arXiv:1602.03316v1 [cs.CR] 10 Feb 2016

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2016-02-10 20:40:16
210Cryptography / Secure communication / Cryptographic hash functions / Cryptographic protocols / Hashing / Transport Layer Security / Collision attack / Cipher suite / MD5 / OpenSSL / SHA-2 / Man-in-the-middle attack

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 07:34:05
UPDATE