Transmission security

Results: 1396



#Item
41HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet  -

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
42IANA Department Plenary Report Michelle Cotton | IETF-94, Yokohama | November 2015 Processing IETF Related Requests A look over the past 12 months (October 2014-September 2015)*

IANA Department Plenary Report Michelle Cotton | IETF-94, Yokohama | November 2015 Processing IETF Related Requests A look over the past 12 months (October 2014-September 2015)*

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2015-11-02 07:03:03
43Introduction to the Guardol Language and Verification System David Hardin Trusted Systems Group Rockwell Collins Advanced Technology Center

Introduction to the Guardol Language and Verification System David Hardin Trusted Systems Group Rockwell Collins Advanced Technology Center

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
44Complex Paths and Derelict Sentinels software engineering underpinnings of recent NTP vulnerabilities Matthew Van Gundy <> Technical Leader, Cisco Advanced Security Initiatives Group (ASIG) LangSec Work

Complex Paths and Derelict Sentinels software engineering underpinnings of recent NTP vulnerabilities Matthew Van Gundy <> Technical Leader, Cisco Advanced Security Initiatives Group (ASIG) LangSec Work

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-06 10:44:10
45NAT Working Group Holdrege INTERNET-DRAFT Communications Category: Informational Srisuresh

NAT Working Group Holdrege INTERNET-DRAFT Communications Category: Informational Srisuresh

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-06-21 11:58:17
46Network Working Group Request for Comments: 2663 Category: Informational P. Srisuresh M. Holdrege

Network Working Group Request for Comments: 2663 Category: Informational P. Srisuresh M. Holdrege

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:16:08
47Application Form Security Leadership Program Fall 2016 Application Deadline: April 15th by 5PM Please submit this completed application form along with aword cover letter explaining why you would like to partici

Application Form Security Leadership Program Fall 2016 Application Deadline: April 15th by 5PM Please submit this completed application form along with aword cover letter explaining why you would like to partici

Add to Reading List

Source URL: cits.uga.edu

Language: English - Date: 2016-03-29 14:03:20
48GFI CreditMatch Technical Installation Instructions Created by GFI Product Support Covers GFI CreditMatch Versionand subsequent versions Email:  Web: www.GFIgroup.com

GFI CreditMatch Technical Installation Instructions Created by GFI Product Support Covers GFI CreditMatch Versionand subsequent versions Email: Web: www.GFIgroup.com

Add to Reading List

Source URL: creditmatch.gfigroup.com

Language: English - Date: 2016-06-06 17:16:30
49Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:58
50“Incorporation of N-1 Security into Optimal Power Flow for FACTS Control” Gabriela Glanzmann, Göran Andersson Important notice Copyright and all rights in this work are retained by the authors. This material may not

“Incorporation of N-1 Security into Optimal Power Flow for FACTS Control” Gabriela Glanzmann, Göran Andersson Important notice Copyright and all rights in this work are retained by the authors. This material may not

Add to Reading List

Source URL: www.eeh.ee.ethz.ch

Language: English - Date: 2008-11-28 06:49:48