Transmission security

Results: 1396



#Item
21Trees in the List: Accelerating List-based Packet Classification Through Controlled Rule Set Expansion Sven Hager Stefan Selent

Trees in the List: Accelerating List-based Packet Classification Through Controlled Rule Set Expansion Sven Hager Stefan Selent

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:55:48
22Enhancing Server Availability and Security Through Failure-Oblivious Computing Martin Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, and William S. Beebee, Jr. Computer Science and Artificial Intellig

Enhancing Server Availability and Security Through Failure-Oblivious Computing Martin Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, and William S. Beebee, Jr. Computer Science and Artificial Intellig

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-08 07:04:45
23Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track  T. Dierks

Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track T. Dierks

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:49
24TURN TCP [draft-ietf-behave-turn-tcp-02] Simon Perreault Viagénie

TURN TCP [draft-ietf-behave-turn-tcp-02] Simon Perreault Viagénie

Add to Reading List

Source URL: www.viagenie.ca

Language: English - Date: 2009-03-25 11:21:45
25University of New Mexico IT Network Design Recommendations Fall, 2012 Prepared by:

University of New Mexico IT Network Design Recommendations Fall, 2012 Prepared by:

Add to Reading List

Source URL: cio.unm.edu

Language: English
26Applied IPv6 Security VersionNov 2002 Dominik Schnitzer1  This article gives a short introduction to the IPv6 protocol, used for the next

Applied IPv6 Security VersionNov 2002 Dominik Schnitzer1 This article gives a short introduction to the IPv6 protocol, used for the next

Add to Reading List

Source URL: www.schnitzer.at

Language: English - Date: 2009-08-25 09:16:23
27Microsoft Word - IBSS&K Engineering.doc

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:10
28Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
29xOMB: Extensible Open Middleboxes with Commodity Servers James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat University of California, San Diego  {jwanderson,rbraud,rkapoor,gmporter,vahdat}@cs.ucs

xOMB: Extensible Open Middleboxes with Commodity Servers James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat University of California, San Diego {jwanderson,rbraud,rkapoor,gmporter,vahdat}@cs.ucs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-02-20 11:32:27
30LX-Series Configuration Guide Corporate Headquarters MRV Communications, Inc. Corporate CenterNordhoff Street

LX-Series Configuration Guide Corporate Headquarters MRV Communications, Inc. Corporate CenterNordhoff Street

Add to Reading List

Source URL: pbxbook.com

Language: English - Date: 2015-09-02 09:36:53