Security architecture for law enforcement agencies
暂无分享,去创建一个
[1] Harald. Kleppe. Performance impact of deploying HTTPS , 2011 .
[2] Nikolai Stoianov,et al. Security Infrastructures: Towards the INDECT System Security , 2012, MCSS.
[3] Marcin Niemiec,et al. A new symmetric block cipher based on key-dependent S-boxes , 2012, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems.
[4] Marcin Niemiec,et al. Quantum Cryptography Protocol Simulator , 2011, MCSS.
[5] Andrzej R. Pach,et al. The measure of security in quantum cryptography , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[6] Dan S. Wallach,et al. Performance analysis of TLS Web servers , 2006, TOCS.
[7] Miroslav Voznak,et al. Security analysis system to detect threats on a SIP VoIP infrasctructure elements , 2011 .
[8] Carlisle Adams,et al. Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .
[9] Marcin Niemiec,et al. Towards Hardware Implementation of INDECT Block Cipher , 2012, MCSS.
[10] Nikolai Stoianov,et al. INDECT Advanced Security Requirements , 2010, ArXiv.
[11] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[12] Mahesh K. Marina,et al. On-demand multipath distance vector routing in ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[13] Debanjan Saha,et al. Transport layer security: how much does it really cost? , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[14] Markus Feilner,et al. Beginning OpenVPN 2.0.9 , 2009 .