Radia Perlman

Results: 9



#Item
1Computing / Network architecture / Computer networking / Routing / Internet Protocol / Routing bridge / Internet Standards / Link-state routing protocol / Internet protocol suite / IP forwarding / IPv4 / TRILL

Rbridges: Transparent Routing Radia Perlman Sun Microsystems Laboratories Abstract— This paper describes a method of interconnecting

Add to Reading List

Source URL: www.postel.org

Language: English - Date: 2004-08-30 19:33:05
2Cloud storage / Business continuity and disaster recovery / Data security / Disk encryption / Backup / Public-key cryptography / File system / Transparent Data Encryption / CTERA Networks

Data: Making it be there where you want it, and making it be gone when you want it gone Radia Perlman

Add to Reading List

Source URL: tce.technion.ac.il

Language: English - Date: 2015-06-21 01:59:30
3

Tutorial on Network Layers 2 and 3 Radia Perlman Intel Labs () 1

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2012-09-07 15:38:04
    4Data security / File hosting / Cryptographic software / Data synchronization / Dropbox / Backup / Public-key cryptography / File system / Remote backup service / Computing / Cloud computing / Software

    1 Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2012-06-30 22:42:56
    5Cloud storage / File hosting / Data security / Web services / Backup / Amazon S3 / Public-key cryptography / Key management / Database / Computing / Network file systems / Cloud computing

    FADE: Secure Overlay Cloud Storage with File Assured Deletion Yang Tang† , Patrick P. C. Lee† , John C. S. Lui† , and Radia Perlman‡ † The Chinese University of Hong Kong ‡ Intel Labs

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2010-10-18 05:22:07
    6X.509 / Public key certificate / Certificate policy / Certificate authority / Trust anchor / Public key infrastructure / X.500 / S/MIME / Certification path validation algorithm / Cryptography / Public-key cryptography / Key management

    Building Certification Paths: Forward vs. Reverse Yassir Elley, Anne Anderson, Steve Hanna, Sean Mullan, Radia Perlman, Seth Proctor {yassir.elley, anne.anderson, steve.hanna, sean.mullan, radia.perlman, seth.proctor}@su

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2001-07-20 00:16:08
    7Cloud storage / File hosting / Data security / Web services / Backup / Amazon S3 / Public-key cryptography / Key management / Database / Computing / Network file systems / Cloud computing

    FADE: Secure Overlay Cloud Storage with File Assured Deletion Yang Tang† , Patrick P. C. Lee† , John C. S. Lui† , and Radia Perlman‡ † The Chinese University of Hong Kong ‡ Intel Labs

    Add to Reading List

    Source URL: www.cse.cuhk.edu.hk

    Language: English - Date: 2010-06-29 19:44:02
    8Cryptographic protocols / Public-key cryptography / Transmission Control Protocol / Communications protocol / Cryptography / Data / Information / Computing

    IETF Security Tutorial Radia Perlman Intel Labs August[removed]removed])

    Add to Reading List

    Source URL: www.ietf.org

    Language: English - Date: 2012-09-07 15:38:02
    9Information / Ethernet / IEEE standards / IEEE 802 / Network switch / IEEE Standards Association / Station / Institute of Electrical and Electronics Engineers / Radia Perlman / Standards organizations / Computing / Data

    March[removed]doc.: IEEE[removed]241r0 RBridges: Transparent Routing Date: [removed]

    Add to Reading List

    Source URL: www.ieee802.org

    Language: English - Date: 2005-03-16 11:54:10
    UPDATE