Protocol analysis

Results: 1021



#Item
71Surveillance / Video surveillance / Video / IP camera / Internet Protocol / Motion analysis / DV

Home Field Advantage Software house from Leipzig implements innovative training tool on the University of Leipzig As every craftsman knows, the best tool helps only if it is at hand the moment you need it. The same appli

Add to Reading List

Source URL: www.ccc-software.de

Language: English - Date: 2013-05-07 05:06:36
72

TAP Protocol Analysis International Virtual Observator y

Add to Reading List

Source URL: wiki.ivoa.net

Language: English - Date: 2008-03-31 09:42:51
    73Computing / Network performance / Internet protocols / Network architecture / Multipath TCP / Transmission Control Protocol / Transport layer / SOCKS / Measuring network throughput / TCP tuning / Performance-enhancing proxy

    A First Analysis of Multipath TCP on Smartphones Quentin De Coninck1 , Matthieu Baerts2 , Benjamin Hesmans1 , and Olivier Bonaventure1 1

    Add to Reading List

    Source URL: inl.info.ucl.ac.be

    Language: English - Date: 2016-06-16 11:23:58
    74

    Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-04-07 02:02:11
      75Email / Internet protocols / Spam filtering / Message transfer agents / Opportunistic TLS / Simple Mail Transfer Protocol / DMARC / Postfix / Transport Layer Security / DomainKeys Identified Mail / Opportunistic encryption / Extended SMTP

      Neither Snow Nor Rain Nor MITMAn Empirical Analysis of Email Delivery Security Zakir Durumeric† David Adrian† Ariana Mirian† James Kasten† Elie Bursztein‡ Nicolas Lidzborski‡ Kurt Thomas‡ Vijay Erant

      Add to Reading List

      Source URL: zakird.com

      Language: English
      76Computing / Internet / Cyberspace / Email / Internet protocols / Spam filtering / Cryptographic protocols / Opportunistic TLS / Simple Mail Transfer Protocol / DMARC / Transport Layer Security / DomainKeys Identified Mail

      Neither Snow Nor Rain Nor MITMAn Empirical Analysis of Email Delivery Security Zakir Durumeric† David Adrian† Ariana Mirian† James Kasten† Elie Bursztein‡ Nicolas Lidzborski‡ Kurt Thomas‡ Vijay Erant

      Add to Reading List

      Source URL: mdbailey.ece.illinois.edu

      Language: English - Date: 2015-11-02 23:42:17
      77

      WIMEDIA EXPLORER 300 ANALYZER WiMedia UWB Protocol Analyzer with Wireless USB and Bluetooth UWB decoding Protocol Analysis and Verification for Wireless USB, Bluetooth UWB and

      Add to Reading List

      Source URL: www.ellisys.com

      Language: English - Date: 2013-02-20 07:09:21
        78Computing / Digital media / Technology / Internet privacy / Hypertext Transfer Protocol / Network protocols / World Wide Web / IPhone / ITunes / Server log / HTTP cookie / Session

        Towards a Better Understanding of Mobile Shopping Assistants – A Large Scale Usage Analysis of a Mobile Bargain Finder Application Stephan Karpischek Chair of Information Management, ETH Z¨urich

        Add to Reading List

        Source URL: cocoa.ethz.ch

        Language: English - Date: 2013-07-17 07:17:50
        79

        1 SCRIPT DRAMA ANALYSIS II The Redecision, Transference, Freudian, Existential, and Darwinian Drama Triangles; Script Formula G and the Three P’s of Script Protocol and Promotion Stephen B. Karpman ABSTRACT

        Add to Reading List

        Source URL: www.karpmandramatriangle.com

        Language: English - Date: 2015-05-12 19:55:12
          80Cryptography / Computing / Dining cryptographers problem / Public-key cryptography / Crowds / Communications protocol / Anonymity / Tor

          Yale University Department of Computer Science Security Analysis of Accountable Anonymity in Dissent Ewa Syta Aaron Johnson Henry Corrigan-Gibbs

          Add to Reading List

          Source URL: ohmygodel.com

          Language: English - Date: 2014-08-17 14:48:08
          UPDATE