Secure transmission

Results: 298



#Item
41Secure Multiparty Computation and Secret Sharing - An Information Theoretic Appoach Ronald Cramer Ivan Damg˚ ard

Secure Multiparty Computation and Secret Sharing - An Information Theoretic Appoach Ronald Cramer Ivan Damg˚ ard

Add to Reading List

Source URL: www.daimi.au.dk

Language: English - Date: 2012-12-31 05:19:12
42The case for ubiquitous transport-level encryption Andrea Bittau Stanford Michael Hamburg Stanford

The case for ubiquitous transport-level encryption Andrea Bittau Stanford Michael Hamburg Stanford

Add to Reading List

Source URL: tcpcrypt.org

Language: English - Date: 2010-06-02 09:05:19
43Secure and Scalable Fault Localization under Dynamic Traffic Patterns

Secure and Scalable Fault Localization under Dynamic Traffic Patterns

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:34:31
44Managing the Network with Merlin Merlin  flickr.com/photos/retiredinwasaga

Managing the Network with Merlin Merlin flickr.com/photos/retiredinwasaga

Add to Reading List

Source URL: frenetic-lang.org

Language: English - Date: 2013-11-22 15:02:04
45Meaningful Use Stage 2 (MU2) CCR Cancer Data Transmission Options Secure FTP Transmission 1. Request access to the Secure File Transfer Protocol (SFTP) service by sending a request to  - with subject

Meaningful Use Stage 2 (MU2) CCR Cancer Data Transmission Options Secure FTP Transmission 1. Request access to the Secure File Transfer Protocol (SFTP) service by sending a request to - with subject

Add to Reading List

Source URL: hie.cdph.ca.gov

Language: English - Date: 2015-01-29 18:01:01
46http2 explained  Background, the protocol, the implementations and the future http://daniel.haxx.se/http2/  by Daniel Stenberg

http2 explained Background, the protocol, the implementations and the future http://daniel.haxx.se/http2/ by Daniel Stenberg

Add to Reading List

Source URL: daniel.haxx.se

Language: English - Date: 2015-05-21 04:06:53
47IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† †  Rob Jansen‡

IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2015-06-06 16:07:00
48Aspera FASPstream for near-live and live video streaming An Aspera Labs Whitepaper AprilWHITE PAPER

Aspera FASPstream for near-live and live video streaming An Aspera Labs Whitepaper AprilWHITE PAPER

Add to Reading List

Source URL: asperasoft.com

Language: English - Date: 2015-04-20 17:07:13
49Telex: Anticensorship in the Network Infrastructure Eric Wustrow∗ ∗ The Scott Wolchok∗

Telex: Anticensorship in the Network Infrastructure Eric Wustrow∗ ∗ The Scott Wolchok∗

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-07-18 09:40:53
50GENIExperimenter/Tutorials/OpenFlowOVS – GENI: geni Intro to OpenFlow Tutorial Overview:

GENIExperimenter/Tutorials/OpenFlowOVS – GENI: geni Intro to OpenFlow Tutorial Overview:

Add to Reading List

Source URL: groups.geni.net

Language: English - Date: 2015-05-25 10:10:32