Back to Results
First PageMeta Content
Tunneling protocols / Computer security / Computer network / Telecommunications engineering / Ethernet / Communications protocol / IPsec / Data link layer / Access control / Data / Information / Computing


EXECUTIVE SUMMARY The Workshop, Standardization and Integration of Unattended and Remote Monitoring Systems, held at Brookhaven National Laboratory on October 15-17, 2002, brought together representatives of the Internat
Add to Reading List

Document Date: 2011-09-06 08:42:29


Open Document

File Size: 158,74 KB

Share Result on Facebook

Company

Braid Group / IAEA / Remote Monitoring Systems / Brookhaven National Laboratory / Aquila / Integrated Review Software / Virtual Private Networks / AES / Microsoft / /

Currency

Rs / /

Facility

Institute of Electrical / /

IndustryTerm

limited applications / storage media / serial-based communications / creative technological solutions / Public-key systems / supported equipment / public-key cryptography systems / asymmetric cryptography algorithms / elliptical curve asymmetric algorithms / removable media / security systems / plant equipment / auxiliary communication devices / unattended monitoring systems / removable storage device / challenge response protocol / surveillance systems / Serial networking / individual software / minimal processor / collision-detect protocols / low-power devices / secret-key systems / serial-wireless communications / local area network / offthe-shelf products / wide area networking / wireless connections / multi-instrument software / software components / control networking standard / Possible solutions / project management / external device / Internet survey / external networking / level protocols / suitable device / wireless options / industrial applications / local interconnection applications / binary exponential back-off algorithm / removable storage devices / real-life equipment / Wireless Ethernet Inside / authentication algorithms / non-deterministic protocol / candidate server operating systems / security critical device / transmission media / radio communications / contention-based technology / nuclear measuring devices / specified protocols / equipment / /

NaturalFeature

Niagara Falls / /

OperatingSystem

Windows XP / Microsoft Windows / Windows Server / Windows NT 4.0 / Windows NT / /

Organization

International Atomic Energy Agency / Associate Laboratory / International Safeguards Project Office / Certificate Authority / Institute of Electrical / Institute of Electrical and Electronics Engineers / /

Person

Michael Ralph / Ralph James / Guy Martelle / Mark Schanfein / Max Aparo / Susan Pepper / Mike Farnitano / Susan Caskey / Then Nikolai Khlebnikov / Jim Jansen / Marius Stein / Peter Button / Todd Main / Tony Capel / Robert Parker / Keith Tolk / /

Position

Director for Energy / Director / Division of Safeguards Technical Services / collector / Manager / inspector / Private / Head / /

Product

Jaz / Windows Server / /

ProvinceOrState

Virginia / Ontario / /

Technology

radiation / authentication algorithms / PKI / mobile phones / secret key / non-deterministic protocol / operating system / TCP/IP protocol / networking protocol / Encryption / cryptography / asymmetric cryptography algorithms / VPN technology / high-level protocols / trusted processor / challenge response protocol / flash / LAN / Public Key Infrastructure / binary exponential back-off algorithm / contention-based technology / VPN / private key / fiber optic / operating systems / TCP/IP / elliptical curve asymmetric algorithms / Ethernet / laser / FTP encryption / digital signature system / public key / minimal processor / frequency hopping / collision-detect protocols / example using file encryption / /

SocialTag