Transport layer

Results: 2091



#Item
491Data / Transmission Control Protocol / Traffic flow / Asynchronous Transfer Mode / Transport layer / Packet switching / Packet loss / Network congestion / Goodput / Computing / Network performance / Network architecture

Switch Buffer Occupancy (Bytes) Fig. 9 shows how much switch buffer space is used when one TCP sends into a slow link with credit flow control turned on, for the configuration depicted in Fig. 2 (a). The flow control sy

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 1999-11-15 17:11:59
492Network performance / Internet protocols / Flow control / Inter-process communication / Transmission Control Protocol / Transport layer / Network congestion / TCP congestion avoidance algorithm / Throughput / Computing / Data / Network architecture

Coordinated Multi-streaming for 3D Tele-immersion David E. Ott and Ketan Mayer-Patel Department of Computer Science University of North Carolina at Chapel Hill ABSTRACT

Add to Reading List

Source URL: www.cs.unc.edu

Language: English - Date: 2004-10-18 07:41:58
493Computer network security / Cyberwarfare / Computer networking / Transmission Control Protocol / Firewall / Transport layer / Packet loss / Packet Processing / Communications protocol / Data / Computing / Information

Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks Antonis Papadogiannakis*, Michalis Polychronakis†, Evangelos P. Markatos* * Institute of Computer Science, Foundation for Research and Techn

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 13:30:49
494Cryptography / Network architecture / Datagram Transport Layer Security / Transport Layer Security / Datagram Congestion Control Protocol / IPsec / Transmission Control Protocol / Cipher suite / Certificate server / Internet protocols / Computing / Cryptographic protocols

The Design and Implementation of Datagram TLS Nagendra Modadugu Stanford University Abstract A number of applications have emerged over recent

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:20
495Cross-platform software / Extensible Messaging and Presence Protocol / Online chat / Technology / XMPP Standards Foundation / Presence information / URI scheme / Simple Authentication and Security Layer / Transport Layer Security / Computing / Computer-mediated communication / Instant messaging

XEP-0170: Recommended Order of Stream Feature Negotiation Peter Saint-Andre mailto: xmpp: https://stpeter.im

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 13:12:24
496Key management / Secure communication / Electronic commerce / Public key certificate / HTTP Secure / Certificate authority / Transport Layer Security / X.509 / Password / Cryptography / Public-key cryptography / Cryptographic protocols

Secure Systems Editor: S.W. Smith, A Funny Thing Happened on the Way to the Marketplace

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:37:33
497Transport Layer Security / Virtual private network / SSL-Explorer: Community Edition / OpenVPN / Computer network security / Computing / Global Technology Associates /  Inc.

PRESS RELEASE FOR IMMEDIATE RELEASE 3505 Lake Lynda Drive, Suite 109

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-10-09 15:50:06
498Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Cryptographic hash function / Security token / Hash chain / Transport Layer Security / Cryptographic nonce / Computing / Cryptography / Internet

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-07-20 15:18:58
499Internet protocols / Data transmission / Network performance / TCP/IP / Transport layer / Transmission Control Protocol / Traffic flow / User Datagram Protocol / Retransmission / Computing / Data / Information

Internet Transport Protocol ENGG1015 1st Semester, 2010 Hayden Kwok-Hay So Transport Layer

Add to Reading List

Source URL: www.eee.hku.hk

Language: English - Date: 2010-11-30 05:35:19
500Security / Internet protocols / Internet standards / Secure communication / Man-in-the-middle attack / Public key fingerprint / Public-key cryptography / Authentication / Transport Layer Security / Cryptography / Cryptographic protocols / Computing

Talking To Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong Xerox Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CAbalfanz,smetters,stewa

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:13:47
UPDATE