Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    132 psk jobs found, pricing in USD

    I need a logo designed. Need A real estate logo As PSK Real Estate & Devlopers. need A excellnet [url removed, login to view] send Sample [Removed by admin]

    $295 (Avg Bid)
    $295 Avg Bid
    10 bids

    i want android and ios mobile application that connects to my vpn windows 2012 server over pptp protocol or l2tp/ipsec psk application should have only one button connect/disconnect and vpn profile should be created browsing over the whole device should be working ip should change to my pool

    $623 (Avg Bid)
    $623 Avg Bid
    52 bids

    ...network as Wi-Fi. Upgrade to Hotspot 2017 PRO or MAX and share your 3G or 4G LTE networks, too. Enjoy Safe and Secure Sharing Your Hotspot is automatically secured with WPA2-PSK encryption, just like a conventional router. That means, all users get the safest and most secure WiFi sharing experience available. Monitor Network Usage By Device Our newest

    $180 (Avg Bid)
    $180 Avg Bid
    2 bids

    ...Tag in 800-960MHZ in RFID using ASK, FSK or PSK Guidelines 1) Must have a plagiarism report and not be plagiarism /pass plagiarism 2) Number of pages from introduction to Conclusion must be 6 3) Must have solution to question of how reader and Tag in 800-960MHZ in RFID using ASK, FSK or PSK communicate 4) Define the problem 5) What

    $46 (Avg Bid)
    $46 Avg Bid
    9 bids

    ...Tag in 800-960MHZ in RFID using ASK, FSK or PSK Guidelines 1) Must have a plagiarism report and not be plagiarism /pass plagiarism 2) Number of pages from introduction to Conclusion must be 6 3) Must have solution to question of how reader and Tag in 800-960MHZ in RFID using ASK, FSK or PSK communicate 4) Define the problem 5) What

    $69 (Avg Bid)
    $69 Avg Bid
    18 bids

    ...Tag in 800-960MHZ in RFID using ASK, FSK or PSK Guidelines 1) Must have a plagiarism report and not be plagiarism /pass plagiarism 2) Number of pages from introduction to Conclusion must be 6 3) Must have solution to question of how reader and Tag in 800-960MHZ in RFID using ASK, FSK or PSK communicate 4) Define the problem 5) What

    $106 (Avg Bid)
    $106 Avg Bid
    8 bids

    Looking for experienced person to implement already existed digital communications ieee papers which are related to Differential M-ary PSK and BER techniques with Matlab CODE and detail working principles of concept

    $172 (Avg Bid)
    $172 Avg Bid
    5 bids

    A (PSK) modulator/ demodulator for the ZYNQ platform is needed. This project is a mere test for the abilities of the bidder. Several Add-On projects will follow. An PSK (BPSK, QPSK,8-PSK) modulator/ demodulator for the ZYNQ (ZC706) platform is needed. The developer will add the PSK (BPSK, QPSK,8-PSK) modulator/ demodulator core into the ADRV9371

    $619 (Avg Bid)
    $619 Avg Bid
    11 bids

    ...the Pi using an Ethernet cable and manually edit the [url removed, login to view] file and add the new ssid and password for the connection. This file contains the fields for SSID and PSK. I want an utility(a shell script running from [url removed, login to view]) to be made such that, whenever I plugin a pen-drive to the pi, the pi looks for a file named [url removed, login to view] ...

    $19 (Avg Bid)
    $19 Avg Bid
    3 bids

    I need an Android app. I would like it designed and built. I want a person to hire, who can give me a Android software to break WPA psk /WPA2 psk to unblock wifi/Android passwords

    $20 (Avg Bid)
    $20 Avg Bid
    3 bids

    Network IP Version: IPv4 Remote Gateway: x Mode Config: No NAT Traversal: No Dead Peer Detection: Yes Authentication PSK: Yes IKEv1 Mode: Main (ID protection) Phase 1 Proposal 3DES-SHA1 3DES-MD5 AES256-SHA1 AES256-SHA256 DH Group: 5 2 Key Lifetime: 86400 XAUTH: No Phase 2 Proposal Local Subnet: x Remote Subnet: 192.168

    $69 (Avg Bid)
    $69 Avg Bid
    11 bids

    ...exchange of these keys occurs in the previous phase called Provisioning Phase where devices configured. Applications can use one key per device or one key for a group of devices. PSK ciphersuite TLS_PSK_WITH_AES_128_CCM_8 is specified mandatory for CoAP. This mode is suitable for devices that are unable to employ the public key cryptography. It also consumes

    $155 (Avg Bid)
    $155 Avg Bid
    1 bids

    ...exchange of these keys occurs in the previous phase called Provisioning Phase where devices configured. Applications can use one key per device or one key for a group of devices. PSK ciphersuite TLS_PSK_WITH_AES_128_CCM_8 is specified mandatory for CoAP. This mode is suitable for devices that are unable to employ the public key cryptography. It also consumes

    $155 (Avg Bid)
    $155 Avg Bid
    1 bids

    ...exchange of these keys occurs in the previous phase called Provisioning Phase where devices configured. Applications can use one key per device or one key for a group of devices. PSK ciphersuite TLS_PSK_WITH_AES_128_CCM_8 is specified mandatory for CoAP. This mode is suitable for devices that are unable to employ the public key cryptography. It also consumes

    $30 - $250
    $30 - $250
    0 bids

    ...exchange of these keys occurs in the previous phase called Provisioning Phase where devices configured. Applications can use one key per device or one key for a group of devices. PSK ciphersuite TLS_PSK_WITH_AES_128_CCM_8 is specified mandatory for CoAP. This mode is suitable for devices that are unable to employ the public key cryptography. It also consumes

    $488 (Avg Bid)
    $488 Avg Bid
    2 bids

    ...exchange of these keys occurs in the previous phase called Provisioning Phase where devices configured. Applications can use one key per device or one key for a group of devices. PSK ciphersuite TLS_PSK_WITH_AES_128_CCM_8 is specified mandatory for CoAP. This mode is suitable for devices that are unable to employ the public key cryptography. It also consumes

    $188 (Avg Bid)
    $188 Avg Bid
    1 bids

    ...exchange of these keys occurs in the previous phase called Provisioning Phase where devices configured. Applications can use one key per device or one key for a group of devices. PSK ciphersuite TLS_PSK_WITH_AES_128_CCM_8 is specified mandatory for CoAP. This mode is suitable for devices that are unable to employ the public key cryptography. It also consumes

    $30 - $250
    $30 - $250
    0 bids

    ...exchange of these keys occurs in the previous phase called Provisioning Phase where devices configured. Applications can use one key per device or one key for a group of devices. PSK ciphersuite TLS_PSK_WITH_AES_128_CCM_8 is specified mandatory for CoAP. This mode is suitable for devices that are unable to employ the public key cryptography. It also consumes

    $109 (Avg Bid)
    $109 Avg Bid
    2 bids

    ...exchange of these keys occurs in the previous phase called Provisioning Phase where devices configured. Applications can use one key per device or one key for a group of devices. PSK ciphersuite TLS_PSK_WITH_AES_128_CCM_8 is specified mandatory for CoAP. This mode is suitable for devices that are unable to employ the public key cryptography. It also consumes

    $155 (Avg Bid)
    $155 Avg Bid
    1 bids

    ...exchange of these keys occurs in the previous phase called Provisioning Phase where devices configured. Applications can use one key per device or one key for a group of devices. PSK ciphersuite TLS_PSK_WITH_AES_128_CCM_8 is specified mandatory for CoAP. This mode is suitable for devices that are unable to employ the public key cryptography. It also consumes

    $30 - $250
    $30 - $250
    0 bids