Vector Security

Results: 220



#Item
101Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Distance-vector routing protocol / Hash chain / Cryptographic hash function / Path vector protocol / Enhanced Interior Gateway Routing Protocol / Interior gateway protocol / Routing protocols / Network architecture / Computing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.monarch.cs.rice.edu

Language: English - Date: 2003-02-20 14:25:57
102Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2003-04-07 16:01:07
103Wireless networking / Computer network security / Temporal Key Integrity Protocol / Wi-Fi Protected Access / Transmission Control Protocol / Initialization vector / Wired Equivalent Privacy / Man-in-the-middle attack / Stream cipher / Cryptography / Cryptographic protocols / IEEE 802.11

A Practical Message Falsification Attack on WPA Toshihiro Ohigashi1 and Masakatu Morii2 1 Hiroshima University, 1–4–2 Kagamiyama, Higashi-Hiroshima, 739–8511 Japan

Add to Reading List

Source URL: jwis2009.nsysu.edu.tw

Language: English - Date: 2014-07-04 02:33:26
104Aircraft instruments / Avionics / Anomaly detection / Data security / Outlier / Autopilot / Air traffic control / Anomaly / Support vector machine / Statistics / Data analysis / Data mining

JOURNAL OF AEROSPACE INFORMATION SYSTEMS Vol. 10, No. 10, October 2013 Discovering Anomalous Aviation Safety Events Using Scalable Data Mining Algorithms Bryan Matthews,∗ Santanu Das,† Kanishka Bhaduri,‡ Kamalika D

Add to Reading List

Source URL: c3.nasa.gov

Language: English - Date: 2014-09-08 18:14:15
105Social Security / Government officials / Legal professions / Ombudsman

DOL vector seal_white [Converted]

Add to Reading List

Source URL: www.dol.gov

Language: English - Date: 2009-02-18 08:44:02
106Del Norte County /  California / Lake County /  California / Mendocino County /  California / Napa County /  California / Redwood Empire Food Bank / Hunger / Alameda County Community Food Bank / Food security / Santa Rosa /  California / Geography of California / Northern California / Food banks

Sonoma Mosquito and Vector Control, City of Santa Rosa Creek Stewardship Program, the Bookmobile and the very entertaining Imaginist Theatre. The kids enjoyed learning about good and bad pests, wildlife habitat and envir

Add to Reading List

Source URL: www.refb.org

Language: English - Date: 2014-10-10 17:57:10
107FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Initialization vector / Message authentication code / Data Encryption Standard / Project 25 / Critical Security Parameter / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard

Department Management Plan (DMP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-16 12:21:50
108Support vector machine / Silicon Valley Microelectronics / Computing / Technology / Electronics / Computer network security / Content-control software / Fortinet

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Value Map™ (SVM) Author – Thomas Skybakmoen Tested Products Barracuda F800b

Add to Reading List

Source URL: www.fortinet.com

Language: English - Date: 2014-12-10 08:59:10
109Data security / Security / Mobile device management / Mobile computers / Mobile application management / Bring your own device / Information security / Federal Information Security Management Act / Security controls / Computer security / Technology / Mobile technology

CIO council COLOR vector Mac

Add to Reading List

Source URL: cio.gov

Language: English - Date: 2013-05-17 15:14:47
110FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Initialization vector / Message authentication code / Data Encryption Standard / Project 25 / Key Wrap / Critical Security Parameter / Cryptography / Cryptography standards / Advanced Encryption Standard

Department Management Plan (DMP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-16 11:58:21
UPDATE