Wireless security

Results: 2930



#Item
31Wireless networking / Cryptography / Technology / Computing / Vehicular ad hoc network / Wireless ad hoc network / Key distribution / Vehicular communication systems / Public-key cryptography / Key management / Vehicle-to-vehicle / Man-in-the-middle attack

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:54:45
32Home automation / Wireless networking / Z-Wave / Napco Security Technologies / Leviton / Economy of New York / Economy of the United States / Technology

iBridge Z-Wave Evaluated Device Listxlsx

Add to Reading List

Source URL: www.napcosecurity.com

Language: English - Date: 2015-01-12 12:15:08
33Computing / Wireless networking / Computer security / Cryptography / Computer network security / Extensible Authentication Protocol / Internet protocols / Wi-Fi / IEEE 802.1X / Xsupplicant / Authentication protocol / RADIUS

802.1x/EAP Authentication Guide RadiusNT/X V5.1 IEA Software, Inc. Administrative and Support Office PO BOX 1170

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2013-02-15 13:27:42
34Security / Cryptography / Cyberwarfare / Computer network security / Biological engineering / Body area network / Wireless networking / Internet privacy / Health informatics / Computer security / Encryption / Medical privacy

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-19 08:03:23
35Radio-frequency identification / Automatic identification and data capture / Privacy / Security / Prevention / Humancomputer interaction / Ubiquitous computing / Wireless / Surveillance / Biometric passport / Privacy Impact Assessment / Clipped tag

DEPARTMENT OF HOMELAND SECURITY Privacy Office Docket No. DHSNotice With Request For Comments: United States Visitor and Immigrant Status Indicator Technology Notice on Automatic Identification of Certain Noni

Add to Reading List

Source URL: epic.org

Language: English - Date: 2007-09-27 14:36:51
36Security / Safety / Crime prevention / Aerospace engineering / Aviation safety / Flight test / Product testing / Security alarm / Closed-circuit television / Computer security / Cockpit / AD Aerospace

AIRCRAFT SECURITY AND SAFETY REMOTE REAL-TIME SURVEILLANCE. WIRELESS COMMAND AND CONTROL FOR CRITICAL SYSTEMS. We provide the industry’s leading solutions to internal and external aircraft surveillance and situational

Add to Reading List

Source URL: www.meggitt.com

Language: English - Date: 2016-07-22 06:47:31
37Wireless networking / Computing / Broadband / Technology / IEEE 802.11 / Local area networks / Internet access / Rights / Wi-Fi / Wireless access point / Wireless security / Virtual LAN

DRONE WORLD Kit Proofpdf

Add to Reading List

Source URL: www.jdevents.com

Language: English - Date: 2016-04-29 10:09:38
38Wireless sensor network / Wireless networking / Computing / Wireless / Technology / Sensor node / Wireless ad hoc network / Linear network coding / ANT / Computer security / Peer-to-peer / Draft:Energy related security attacks

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-12 08:33:06
39Computing / Wireless networking / Smartphones / IOS / Personal computing / Cloud clients / Wi-Fi / IPhone / Security token / Tablet computer / Wireless LAN / IPad

Initial Settings from smartphone  ■Initial Settings from Android smartphone/tablet PC  1. Turn on the Product  Insert the Product into a device (e.g. digital still camera) which is compatible

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-07-31 22:51:17
40Technology / Advanced driver assistance systems / Security / Vehicle telematics / Wireless networking / Global Positioning System / Autonomous cruise control system / Computer security / Vehicle-to-vehicle / Vehicular automation / Autonomous car

Vehicle Trust Management for Connected Vehicles FINAL RESEARCH REPORT Insup Lee (PI), Nicola Bezzo, Jian Chang Contract No. DTRT12GUTG11

Add to Reading List

Source URL: utc.ices.cmu.edu

Language: English - Date: 2016-04-08 11:05:18
UPDATE