Transmission security

Results: 1396



#Item
31European Distribution System Operators for Smart Grids Response to the European Commission’s public consultation on risk preparedness in the area of security of electricity supply

European Distribution System Operators for Smart Grids Response to the European Commission’s public consultation on risk preparedness in the area of security of electricity supply

Add to Reading List

Source URL: www.edsoforsmartgrids.eu

Language: English - Date: 2015-10-05 06:13:16
32Our Works The Technique and Concrete Protocol of Kunda and Paterson Our Contribution Our Future Research and Conclusion  A Security Proof for Key Exchange Protocol

Our Works The Technique and Concrete Protocol of Kunda and Paterson Our Contribution Our Future Research and Conclusion A Security Proof for Key Exchange Protocol

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:55
33The table below summarizes the PCI DSS compliance status of Transaction Network Services’ payment transmission and processing environments globally. The table also lists the products and services associated with these

The table below summarizes the PCI DSS compliance status of Transaction Network Services’ payment transmission and processing environments globally. The table also lists the products and services associated with these

Add to Reading List

Source URL: www.tnsi.com

Language: English - Date: 2016-03-21 10:44:01
34ches Fri Apr 20 07:46:11 EDT 1990  The Design of a Secure Internet Gateway Bill Cheswick  AT&T Bell Laboratories

ches Fri Apr 20 07:46:11 EDT 1990 The Design of a Secure Internet Gateway Bill Cheswick AT&T Bell Laboratories

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 17:42:40
3564  IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
36Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:59:39
37Emergency Stop Spiral 2, take 2 Wednesday, March 17, 2010

Emergency Stop Spiral 2, take 2 Wednesday, March 17, 2010

Add to Reading List

Source URL: groups.geni.net

Language: English - Date: 2010-04-07 14:22:56
38STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming Bruce DeBruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague Carnegie Mellon University Electrical and Computer Engineering {debruhl, yuseu

STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming Bruce DeBruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague Carnegie Mellon University Electrical and Computer Engineering {debruhl, yuseu

Add to Reading List

Source URL: research.owlfolio.org

Language: English - Date: 2016-04-20 11:44:16
39  	
   ПРЕДСТАВЛЕНИЕ ВОПРОСОВ НА ГОЛОСОВАНИЕ ВЛАДЕЛЬЦЕВ ЦЕННЫХ БУМАГTHE	
  COMPANIES	
  LAW,	
  CAP.	
  113	
   _____________	
  

    ПРЕДСТАВЛЕНИЕ ВОПРОСОВ НА ГОЛОСОВАНИЕ ВЛАДЕЛЬЦЕВ ЦЕННЫХ БУМАГTHE  COMPANIES  LAW,  CAP.  113   _____________  

Add to Reading List

Source URL: static.qiwi.com

Language: English - Date: 2016-08-18 04:20:24
40Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:50