Results 11 to 20 of about 4,651,731 (290)
HTTPA: HTTPS Attestable Protocol
10 pages, 8 ...
King, Gordon, Wang, Hans
openaire +2 more sources
Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over ...
Chanh Minh Tran +3 more
doaj +1 more source
Detection of Application Layer DDoS Attack Based on SIS Epidemic Model
Distrusted Denial of Service attack (DDoS) is one of the major threats to network security. The HTTP flooding attack is the hardest type of DDoS attacks to detect since the malicious packets are hidden in a huge amount of normal traffic. In this work, we
Dalia Nashat +2 more
doaj +1 more source
This paper discusses the comparison of service quality between HTTP protocol and MQTT protocol implemented using internet of things to research on soil moisture around plants, quality of service compared to delay, jitter, throughput and packet loss.
Anang Dwi Prakoso +2 more
doaj +1 more source
HTTP adaptive streaming with media fragment URIs [PDF]
HTTP adaptive streaming was introduced with the general idea that user agents interpret a manifest file (describing different representations and segments of the media); where-after they retrieve the media content using sequential HTTP progressive ...
Mannens, Erik +3 more
core +1 more source
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
Many group key management protocols have been proposed to manage key generation and distribution of vehicular communication. However, most of them suffer from high communication and computation costs due to the complex elliptic curve and bilinear pairing
Shimaa A. Abdel Hakeem, HyungWon Kim
doaj +1 more source
To facilitate learning with video streaming, a transport protocol that can send video is needed, such as HTTP (Hyper Text Transfer Protocol) or RTSP (Real Time Streaming Protocol).
Mohamad Iqbal Maulana Firmansyah +2 more
doaj +1 more source
Covert Channel Construction Method Based on HTTP Composite Protocols
Aiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol ...
Longxing Jin +4 more
doaj +1 more source
Apache Dynamic Update for Feedback Control of Computing Resources
This paper shows an environment for performing data collection in the computational system that provides the response service to “HTTP” requests and makes interventions in the values of the available parameters in order to control the ...
Marcos V. S. Barreto +7 more
doaj +1 more source
Evaluation of a Phosphate Management Protocol to Achieve Optimum Serum Phosphate Levels in Hemodialysis Patients [PDF]
Original article can be found at: http://www.sciencedirect.com/science/journal/10512276 Copyright National Kidney Foundation, Inc. DOI: 10.1053/j.jrn.2008.05.003To evaluate the effectiveness of a protocol designed to optimize serum phosphate levels in ...
Cheung, C.F. +5 more
core +1 more source

