Network protocols

Results: 10979



#Item
21Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele1 and Kenneth G. Paterson2 ?

Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele1 and Kenneth G. Paterson2 ?

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English
22[DV04] DN-500BD  Serial Command Protocol Guide VerMarch 16th, 2016

[DV04] DN-500BD Serial Command Protocol Guide VerMarch 16th, 2016

Add to Reading List

Source URL: e345eb35efcb99754b1f-525d2f2124a3483dfbd3f17c87329990.r36.cf2.rackcdn.com

Language: English - Date: 2016-03-16 11:46:25
23Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-19 14:01:38
24Improving Restoration Success in Mesh Optical Networks Fang Yu 1, Rakesh Sinha2, Dongmei Wang3, Guangzhi Li3, John Strand2, Robert Doverspike2, Charles Kalmanek 3, and Bruce Cortez 2 1 EECS Department, UC Berkeley, Berke

Improving Restoration Success in Mesh Optical Networks Fang Yu 1, Rakesh Sinha2, Dongmei Wang3, Guangzhi Li3, John Strand2, Robert Doverspike2, Charles Kalmanek 3, and Bruce Cortez 2 1 EECS Department, UC Berkeley, Berke

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 20:21:43
25Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Add to Reading List

Source URL: ietf.org

Language: English - Date: 2014-03-02 06:27:58
26DIY DNS DFIR: You’re Doing it WRONG Andrew Hay, CISO DataGravity, Inc.  twitter.com/andrewsmhay

DIY DNS DFIR: You’re Doing it WRONG Andrew Hay, CISO DataGravity, Inc. twitter.com/andrewsmhay

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-04-15 13:43:26
272015 IEEE Symposium on Security and Privacy  How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

2015 IEEE Symposium on Security and Privacy How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:10
28

PDF Document

Add to Reading List

Source URL: hm.hgesser.de

Language: English - Date: 2009-03-04 06:20:16
29IEN 149 RFC 765 J. Postel ISI June 1980

IEN 149 RFC 765 J. Postel ISI June 1980

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-06-21 11:56:09
30Web Intelligence and Virtual Enterprises, 2009  Bridging Virtual Communities: The Object-Subscription Protocol James King and Jalal Kawash

Web Intelligence and Virtual Enterprises, 2009 Bridging Virtual Communities: The Object-Subscription Protocol James King and Jalal Kawash

Add to Reading List

Source URL: wic.litislab.fr

Language: English - Date: 2013-12-09 08:25:54