Vector Security

Results: 220



#Item
201Backup / Computing / Failover / Network switch / Ethernet / Data security / Fault-tolerant computer systems

Miranda_logo_vector_BELDEN

Add to Reading List

Source URL: www.miranda.com

Language: English - Date: 2013-04-01 18:30:03
202Cyberwarfare / Risk analysis / Security / Computer security / Computer network security / Threat

Langley School District Vector Logo Colour

Add to Reading List

Source URL: www2.sd35.bc.ca

Language: English - Date: 2014-03-02 17:28:42
203Cryptanalysis / Advantage / Cipher / Symmetric-key algorithm / Chosen-plaintext attack / Substitution cipher / Initialization vector / Ciphertext stealing / Cryptography / One-time pad / Ciphertext

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:01
204Technology / Computer network security / Routing / Computer networking / Packet loss / Dynamic Source Routing / Ad hoc On-Demand Distance Vector Routing / Mobile ad hoc network / Source routing / Wireless networking / Computing / Network architecture

Performance Evaluation of the Impact of Attacks on Mobile Ad hoc Networks Malcolm Parsons

Add to Reading List

Source URL: www.cse.buffalo.edu

Language: English - Date: 2009-09-16 16:14:00
205IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]  

Add to Reading List

Source URL: WWW.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
206Security / Image processing / Biometrics / Identification / Segmentation / Feature selection / Feature vector / Pattern recognition / Extremely high frequency / Machine learning / Statistics / Surveillance

Simulation of Millimeter Wave Body Images and its Application to Biometric Recognition Miriam Moreno-Morenoa , Julian Fierreza , Ruben Vera-Rodrigueza and Josep Parronb

Add to Reading List

Source URL: atvs.ii.uam.es

Language: English - Date: 2012-10-31 02:06:52
207Initialization vector / Probabilistic encryption / Block cipher modes of operation / Authenticated encryption / Malleability / Ciphertext / Advantage / Block cipher / Chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Semantic security

Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-01 14:57:44
208IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2001-10-23 20:39:38
209Block cipher modes of operation / Block cipher / Initialization vector / Ciphertext / Cipher / One-time pad / Symmetric-key algorithm / Known-plaintext attack / Data Encryption Standard / Cryptography / Stream ciphers / Keystream

Building Stream Ciphers from Block Ciphers and their Security Hans Christoph Hudde

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
210OSI protocols / Routing / Wireless ad-hoc network / Optimized Link State Routing Protocol / Mobile ad hoc network / Destination-Sequenced Distance Vector routing / Peer-to-peer / Scalable Source Routing / Dynamic Source Routing / Wireless networking / Technology / Network architecture

Report on a Working Session on Security in Wireless Ad Hoc Networks Levente Butty´an

Add to Reading List

Source URL: people.ece.cornell.edu

Language: English - Date: 2002-09-18 09:25:54
UPDATE