![Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner](https://www.pdfsearch.io/img/6656276f1bb2ad483a2b04c2a5d2ada2.jpg) Date: 2007-07-26 16:56:51Computing Network architecture Internet Internet protocols Computer network security Internet Standards Transmission Control Protocol Tunneling protocols Port knocking SOCKS Internet protocol suite Port scanner | | S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455 Add to Reading ListSource URL: www-users.cs.umn.eduDownload Document from Source Website File Size: 1,50 MBShare Document on Facebook
|