×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [peer authentication]
BGP Countermeasures (Secure-BGP) BBN Technologies Stephen Kent, Charles Lynn, Luis Sanchez, Martha Steenstrup, Michelle Casagni, Karen Seo
215 views
1 DNSSEC From a protocol bug to a security advantage Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb
227 views
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca
215 views
Byzantine Fault Tolerant Public Key Authentication in Peer-to-peer Systems Vivek Pathak and Liviu Iftode Department of Computer Science Rutgers University
218 views
Security Data Transmission and Authentication Lesson 9
224 views
S Security and DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research
228 views
1 DNSSEC Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb dig +dnssec 1.6.5.3.7.5.1.4.6.3.9.4.e164.arpa. naptr
217 views
1 Peer-to-Peer Security in Wireless Ad Hoc Networks + CommonSenseNet Jean-Pierre Hubaux EPFL, Switzerland
226 views
Watchguard V60 and Fortigate 60 VPN
616 views
Peer-to-Peer Security in Wireless Ad Hoc Networks + CommonSenseNet
71 views
Real Time Communications: An Enterprise View Rodger M. Will Ford Motor Company Wednesday, April 21, 2004
220 views