Transmission security

Results: 1396



#Item
71Phantom Boundaries and Cross-layer Illusions inDigital Radio (Research Report) Travis Goodspeed Straw Hat Security

Phantom Boundaries and Cross-layer Illusions inDigital Radio (Research Report) Travis Goodspeed Straw Hat Security

Add to Reading List

Source URL: spw14.langsec.org

Language: English - Date: 2014-06-12 23:25:59
72Pluggable Transports Roadmap Steven J. Murdoch and George Kadianakis , Tor Tech ReportMarch 17, 2012

Pluggable Transports Roadmap Steven J. Murdoch and George Kadianakis , Tor Tech ReportMarch 17, 2012

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2012-08-26 02:02:15
73Detecting Forged TCP Reset Packets Nicholas Weaver ICSI   Robin Sommer

Detecting Forged TCP Reset Packets Nicholas Weaver ICSI Robin Sommer

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:05
74Reducing Latency in Tor Circuits with Unordered Delivery Michael F. Nowlan, David Wolinsky, and Bryan Ford Yale University Abstract Tor, the popular anonymous relay tool, incurs significant latency costs—partly due to

Reducing Latency in Tor Circuits with Unordered Delivery Michael F. Nowlan, David Wolinsky, and Bryan Ford Yale University Abstract Tor, the popular anonymous relay tool, incurs significant latency costs—partly due to

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-07-21 06:56:10
75Very Fast Containment of Scanning Worms Nicholas Weaver ICSI Stuart Staniford Nevis Networks

Very Fast Containment of Scanning Worms Nicholas Weaver ICSI Stuart Staniford Nevis Networks

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:10
76JPCERT/CC Incident Handling Report [April 1, 2015 – June 30, 2015]

JPCERT/CC Incident Handling Report [April 1, 2015 – June 30, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2015-09-09 21:00:36
77Press Release  RADWIN’s Video Surveillance Transmission Solutions Deployed in Security Projects in South Africa Network Embedded Technologies chooses RADWIN’s links for remote video transmission, enabling corporation

Press Release RADWIN’s Video Surveillance Transmission Solutions Deployed in Security Projects in South Africa Network Embedded Technologies chooses RADWIN’s links for remote video transmission, enabling corporation

Add to Reading List

Source URL: www.radwin.com

Language: English - Date: 2012-10-25 10:45:13
    78JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

    JPCERT/CC Internet Threat Monitoring Report[January 1, March 31, 2015]

    Add to Reading List

    Source URL: www.jpcert.or.jp

    Language: English - Date: 2015-06-29 20:52:09
    79The Top Speed of Flash Worms Stuart Staniford∗ David Moore†  Vern Paxson‡

    The Top Speed of Flash Worms Stuart Staniford∗ David Moore† Vern Paxson‡

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:06
    80Google Summer of Code Proposal: A Framework for Website Fingerprinting Countermeasures   Marc Juarez Miro ()

    Google Summer of Code Proposal: A Framework for Website Fingerprinting Countermeasures   Marc Juarez Miro ()

    Add to Reading List

    Source URL: securehomes.esat.kuleuven.be

    Language: English - Date: 2014-04-22 05:29:47