Communications protocol

Results: 5018



#Item
951942  JOURNAL OF SOFTWARE, VOL. 5, NO. 9, SEPTEMBER 2010 A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical

942 JOURNAL OF SOFTWARE, VOL. 5, NO. 9, SEPTEMBER 2010 A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2013-08-05 10:54:48
952Protocol on Recording and the Use of Communications Devices during Court Proceedings

Protocol on Recording and the Use of Communications Devices during Court Proceedings

Add to Reading List

Source URL: www.court.nl.ca

Language: English - Date: 2015-03-03 08:32:59
953The Evolution of Libnet The RSA Conference February 2004 Mike Schiffman, Cisco Systems  Agenda

The Evolution of Libnet The RSA Conference February 2004 Mike Schiffman, Cisco Systems Agenda

Add to Reading List

Source URL: packetfactory.openwall.net

Language: English - Date: 2004-03-10 00:01:42
954draft-ietf-httpbis-http2-17 - Hypertext Transfer Protocol version 2

draft-ietf-httpbis-http2-17 - Hypertext Transfer Protocol version 2

Add to Reading List

Source URL: tools.ietf.org

Language: English
955Mace: Language Support for Building Distributed Systems Charles Killian James W. Anderson  Ryan Braud

Mace: Language Support for Building Distributed Systems Charles Killian James W. Anderson Ryan Braud

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2007-03-29 03:37:10
956FOR IMMEDIATE RELEASE For further information, contact: Lenore Tracey, +Modbus-IDA and CAN in Automation Announce CiA DSP 309: Interfacing CANopen with TCP/IP Part 2: Modbus/TCP Mapping

FOR IMMEDIATE RELEASE For further information, contact: Lenore Tracey, +Modbus-IDA and CAN in Automation Announce CiA DSP 309: Interfacing CANopen with TCP/IP Part 2: Modbus/TCP Mapping

Add to Reading List

Source URL: modbus.org

Language: English - Date: 2005-06-22 17:21:29
957Experiences with Pip: Finding Unexpected Behavior in Distributed Systems Overview ●  Bugs found

Experiences with Pip: Finding Unexpected Behavior in Distributed Systems Overview ● Bugs found

Add to Reading List

Source URL: issg.cs.duke.edu

Language: English - Date: 2005-11-07 16:57:17
958Pi: A Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu  Abstract

Pi: A Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-07-15 10:32:33
959Understanding RFID Counting Protocols Binbin Chen Ziling Zhou ∗  Haifeng Yu

Understanding RFID Counting Protocols Binbin Chen Ziling Zhou ∗ Haifeng Yu

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2013-09-24 02:30:48
960Detecting Stepping Stones Yin Zhang and Vern Paxson Abstract  The problem of detecting stepping stones was first addressed in a ground-breaking paper by Staniford-Chen and

Detecting Stepping Stones Yin Zhang and Vern Paxson Abstract The problem of detecting stepping stones was first addressed in a ground-breaking paper by Staniford-Chen and

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 05:45:16