Vector Security

Results: 220



#Item
41Block cipher modes of operation / Encryption / Advanced Encryption Standard / Initialization vector / Computer security / Public-key cryptography / Cryptography / Precomputation / Authenticated encryption

Secure Cryptographic Precomputation with Insecure Memory? Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:18
42Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Computer networking / Path vector protocol / Router / Convergence / Network architecture / Internet / Computing

IMPACT OF BGP SECURITY DEPLOYMENT ON ROUTE VALIDATION ALEX ȘTEFĂNESCU 2 MarBGP SECURITY ISSUES

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2011-03-03 09:07:54
43Financial statements / Financial planning / New York Society of Security Analysts / Professional certification in finance / Balance sheet / CFA Institute / Chartered Financial Analyst / Valuation / Income statement / Finance / Accountancy / Business

nyssa_logo_vector_greenbox

Add to Reading List

Source URL: www.nyssa.org

Language: English - Date: 2014-08-20 11:11:25
44OSI protocols / Routing / Computing / Optimized Link State Routing Protocol / Link-state routing protocol / Distance-vector routing protocol / Mobile ad hoc network / Wireless networking / Routing algorithms / Network architecture

Risk-Aware Response for Mitigating MANET Routing Attacks Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, US

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2010-08-02 20:35:26
45Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Computer networking / Path vector protocol / Router / Convergence / Network architecture / Internet / Computing

IMPACT OF BGP SECURITY DEPLOYMENT ON ROUTE VALIDATION ALEX ȘTEFĂNESCU 2 MarBGP SECURITY ISSUES

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-03-03 09:07:54
46Electromagnetism / Computer storage / Data remanence / Data security / Degaussing / Hard disk drive / Digital Linear Tape / Disk formatting / Computer hardware / Computer storage media / Computing

HD-3WXL High Security Hard Drive & Tape Degausser The Most Features in a Compact Degausser • • •

Add to Reading List

Source URL: www.vector.hk

Language: English - Date: 2013-05-26 23:13:11
47Computing / Vehicular ad-hoc network / Mobile ad hoc network / Denial-of-service attack / Ad hoc On-Demand Distance Vector Routing / Wireless ad-hoc network / Transmission Control Protocol / Wireless security / Mesh networking / Wireless networking / Technology / Telecommunications engineering

International Journal of Academic Research in Business and Social Sciences July 2013, Vol. 3, No. 7 ISSN: Minimization of Denial of services attacks in Vehicular Adhoc networking by applying different constrain

Add to Reading List

Source URL: hrmars.com

Language: English - Date: 2013-07-22 21:47:47
48Computing / Computer network security / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Verisign / Root name server / Anti-spam techniques / Prolexic Technologies / Domain name system / Denial-of-service attacks / Internet

VRSN_logo_vertical_CMYK_reverse_vector

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2013-12-20 15:52:37
49Risk / Software testing / Hacking / Cross-site scripting / Cross-site request forgery / Vulnerability / Code injection / Remote file inclusion / SQL injection / Cyberwarfare / Computer security / Failure

Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015

Add to Reading List

Source URL: www.atlassian.com

Language: English - Date: 2015-05-09 18:02:05
50Computing / Cyberwarfare / Radio-frequency identification / Verisign / Denial-of-service attacks / Denial-of-service attack / Root name server / Internet security / Botnet / Computer network security / Domain name system / Internet

VRSN_logo_vertical_CMYK_vector

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2015-04-16 16:20:08
UPDATE