Media access control

Results: 637



#Item
51Microsoft / Computing / Webmail / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet privacy / Outlook.com / Password / Email / Click

Government Executive Media Group  Viewcast Registration Procedures      Dear Registrant,    

Add to Reading List

Source URL: cdn.govexec.com

Language: English - Date: 2016-04-15 10:11:18
52Engineering / Technology / Global Positioning System / Radio resource management / Electronics / Media access control / Wireless networking / Oscillators / CdmaOne / Code division multiple access / GPS signals / Pseudorandom noise

A New Class of Precision UTC and Frequency Reference Using IS-95 CDMA Base Station Transmissions Bruce M. Penrod EndRun Technologies Abstract

Add to Reading List

Source URL: www.endruntechnologies.com

Language: English - Date: 2002-01-01 18:11:48
53Computing / Digital media / Computer access control / Identity management systems / Identity management / Security Assertion Markup Language / Password / Email / Infrastructure optimization / Internet

Align Engage your employees with secure video. Ustream Align makes it easy to deliver town halls, trainings and departmental communications to employees everywhere.

Add to Reading List

Source URL: info.ustream.tv

Language: English - Date: 2016-06-04 02:23:00
54Computer access control / Internet protocols / Cloud standards / Digital media / Mobile content / Universal Plug and Play / OAuth / Authentication / Application programming interface / Mediascape

Instrument: Collaborative Project (STREP) Call Identifier: FP7-ICT2013-10 Grant Agreement: WP3 – CONNECT – Multi-connection and authentication

Add to Reading List

Source URL: www.mediascapeproject.eu

Language: English - Date: 2015-11-20 12:57:38
55Working groups / Local area networks / IEEE standards / Computing / IEEE 802.3 / Media access control / Institute of Electrical and Electronics Engineers / Next Generation Mobile Networks / IEEE 802 / Ethernet / Technology / Wireless LAN

Tutorial Sections Monday November 9, 2015 Landmark Ballroom B/C Hyatt Regency Dallas Presentation Details Available at: http://www.ieee802.org/Tutorials.shtml SECTION #1

Add to Reading List

Source URL: www.ieee802.org

Language: English - Date: 2015-11-03 18:54:00
56

Access Management Network and System authentication, data/service authorization, password/credential management Physical Security Environmental controls, Control of access to critical facilities, equipment and/or media,

Add to Reading List

Source URL: www.vascan.org

Language: English - Date: 2010-08-17 10:17:16
    57Cryptography / Prevention / Computer access control / Security / Access control / Authentication / Notary / Packaging / Password / Questionnaire / Job interview / Cognitive password

    Where Have You Been? Using Location-Based Security Questions for Fallback Authentication Alina Hang Media Informatics Group University of Munich (LMU)

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2016-02-21 12:56:55
    58Ethernet / Computing / Network architecture / PHY / Physical Coding Sublayer / Physical layer / Physical Medium Dependent / Interpacket gap / PCI Express / Throughput / Media access control / Measuring network throughput

    4948_ibm_4948_kernel_1518_3562_cdf.eps

    Add to Reading List

    Source URL: fireless.cs.cornell.edu

    Language: English - Date: 2013-02-22 13:55:01
    59OSI protocols / Internet Standards / Internet protocols / Wireless networking / Communications protocol / Data transmission / Transport layer / Data link layer / Link layer / Reliability / Media access control / ZigBee

    A Unifying Link Abstraction for Wireless Sensor Networks Joseph Polastre, Jonathan Hui, Philip Levis, Jerry Zhao, David Culler, Scott Shenker, and Ion Stoica Computer Science Department University of California, Berkeley

    Add to Reading List

    Source URL: csl.stanford.edu

    Language: English - Date: 2006-05-10 08:41:27
    60Software / Computing / Digital media / Social networking services / Facebook / Blog hosting services / Social media / Social information processing / Internet privacy / Privacy / Google+ / Recommender system

    Understanding and Specifying Social Access Control Lists Mainack Mondal Yabing Liu Bimal Viswanath

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
    UPDATE