Results 281 to 290 of about 335,875 (298)
Some of the next articles are maybe not open access.
Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing
2022C. Amsüss +2 more
openaire +1 more source
Evaluating the performance of the OSCORE security protocol in constrained IoT environments
Internet of Things (Netherlands), 2021exaly
Application of Nanotechnology in Cancer Therapy and Imaging
Ca-A Cancer Journal for Clinicians, 2008Lily Yang, Zhong Chen, Dong M Shin
exaly
Analysis of the constrained application protocol over quick UDP internet connection transport
Internet of Things (Netherlands), 2020Rolando Herrero
exaly
A Survey of IoT Management Protocols and Frameworks
IEEE Communications Surveys and Tutorials, 2020Soraya Sinche Maita +2 more
exaly
Energy Efficient Communication Using Constrained Application Protocol for IoT Devices
2022Namrata Singh, Ayan Kumar Das
openaire +1 more source
Service Discovery Protocols for Constrained Machine-to-Machine Communications
IEEE Communications Surveys and Tutorials, 2014Antonio J, Jara +2 more
exaly

