Network layer

Results: 1811



#Item
81Wireless networking / Local area networks / Radio resource management / Multiplexing / Orthogonal frequency-division multiplexing / Software-defined radio / Carrier frequency offset / Single-frequency network / IEEE 802.11 / Telecommunication / Wi-Fi / Wireless LAN

Phantom: Physical Layer Cooperation for Location Privacy Protection Sangho Oh∗ , Tam Vu∗ , Marco Gruteser∗ , Suman Banerjee† ∗ WINLAB, Rutgers University, Rt 1 Tech Center, North Brunswick, NJ, USA

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-01-16 22:52:29
82Network protocols / Internet protocols / Denial-of-service attacks / Transmission Control Protocol / Hypertext Transfer Protocol / TCP Fast Open / Traversal Using Relays around NAT / Denial-of-service attack / SYN cookies / Server Message Block

ASAP: A Low-Latency Transport Layer Qingxi Li, Wenxuan Zhou, Matthew Caesar, Brighten Godfrey Dept. of Computer Science, University of Illinois at Urbana-Champaign Urbana, Illinois, USA , wzhou10@illin

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:51:35
83Computer network security / Layer 2 Tunneling Protocol / Ethernet / DMZ / Virtual private network / Network switch / Light-emitting diode / Cisco PIX

Secure Computing SG User Manual Secure Computing 4810 Harwood Road San Jose, CA

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2006-03-14 00:54:01
84Network architecture / OSI protocols / Computer networking / Telecommunications engineering / Internet protocol suite / Internetworking / Communications protocol / Routing protocol / Computer network / Data link layer / Link layer / Network layer

CS 440 Computer Networks Spring 2016

Add to Reading List

Source URL: www.cs.siu.edu

Language: English - Date: 2016-01-25 00:01:17
85Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / Certificate policy / Energy Sciences Network / Revocation list / Public key certificate / Information security

Procedures and guidelines for the Policy Management Authority of the ESnet PKI Version X.X - DRAFT

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2004-02-11 16:14:38
86OSI protocols / Computer networking / Network architecture / Network protocols / Internet Standards / OSI model / Internet protocol suite / Data link layer / Link layer / Communications protocol / Address Resolution Protocol / Network switch

CER T IFIED F5 STUDY GUIDE 101 – Application Delivery Fundamentals Eric Mitchell

Add to Reading List

Source URL: www.f5.com

Language: English
87Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Certificate policy / Certificate authority / Public key certificate / Revocation list / X.509 / Energy Sciences Network / Authentication

Microsoft Word - CP-CPS-V25.doc

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2004-08-17 13:10:06
88Network performance / TCP congestion control / Throughput / Transmission Control Protocol / Audio bit depth / Maximum segment size / Error detection and correction / Signal-to-noise ratio / Bit error rate / Transport layer / Orthogonal frequency-division multiplexing / Physical layer

This is the author’s version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2016-01-28 16:52:11
89Tunneling protocols / Point-to-Point Tunneling Protocol / Internet protocols / Internet Standards / Virtual private networks / Computer network security / Layer 2 Tunneling Protocol / Point-to-Point Protocol daemon

Microsoft Word - Configure PPTP Server.doc

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:45:38
90Transport Layer Security / Computer network security / Internet privacy / Computer networking / Network performance / Proxy server / Certificate authority / World Wide Web / Password / Man-in-the-middle attack / Online banking

Internet Banking Some InternetAnalyzing DNS Incidents SSL and users

Add to Reading List

Source URL: www.rvs.uni-bielefeld.de

Language: English - Date: 2002-12-19 11:49:33
UPDATE