and Security Technologies

Results: 1110



#Item
131Computing / Cryptography / Network architecture / IPsec / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / StrongSwan / Internet Key Exchange / Opportunistic encryption / NAT traversal

Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2006-04-27 10:23:08
132Computing / Cryptography / Computer network security / Network architecture / IPsec / Cryptographic protocols / Virtual private networks / Tunneling protocols / StrongSwan / Internet Key Exchange

VPN with Mobile Devices revisited 55. DFN Betriebstagung Oktober 2011 Berlin Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications HSR Hochschule für Technik Rapperswil

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2011-10-24 00:14:43
133Computer security / Computing / Cryptography / Computer network security / Trusted computing / IPsec / Cryptographic software / Cryptographic protocols / StrongSwan / Trusted Network Connect / IF-MAP / Internet Key Exchange

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2012-08-29 15:32:53
134

Emerging Technologies of National Security and Intelligence (ETNSI) The nature of war and conflict continues to change. The Emerging Technologies of National Security and Intelligence (ETNSI) initiative at the University

Add to Reading List

Source URL: reilly.nd.edu

Language: English - Date: 2013-03-06 11:29:21
    135

    Firm Says New Ebola Rapid Testing Technologies Will Detect Surface and Airborne Infectious Viruses in Minutes By: Homeland Security Today Staff:21am) — A new suite of mobile bio-detection technologies th

    Add to Reading List

    Source URL: pathsensors.com

    Language: English
      136

      Software Testing & Certification Overview Bad software is one of the leading reasons for information security breaches and concerns. Bad software will expose your electronic voting technologies and enterprise systems to

      Add to Reading List

      Source URL: www.data-defenders.com

      Language: English - Date: 2010-07-26 18:20:05
        137

        Call for Papers, Posters, and Tutorials 2016 IEEE International Symposium on Technologies for Homeland Security 10 – 12 May Westin Hotel, Waltham, MA http://ieee-hst.org/

        Add to Reading List

        Source URL: ieee-hst.org

        Language: English - Date: 2016-02-25 16:12:05
          138

          Call for Doctoral positions at the International Doctoral School in “Information and Communication Technologies” - 31st Cycle Project European Training Network for Cyber-security - NeCS ETN H2020-MSCA-ITN-2015 – Ma

          Add to Reading List

          Source URL: www.unitn.it

          Language: English
            139

            Firm Says New Ebola Rapid Testing Technologies Will Detect Surface and Airborne Infectious Viruses in Minutes By: Homeland Security Today Staff:21am) — A new suite of mobile bio-detection technologies th

            Add to Reading List

            Source URL: www.pathsensors.com

            Language: English - Date: 2014-10-27 12:06:41
              140

              July 28, 2015 The Honorable John Ratcliffe Chairman Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies

              Add to Reading List

              Source URL: homeland.house.gov

              Language: English - Date: 2015-08-31 16:52:06
                UPDATE