Results 1 to 10 of about 548,723 (329)

Assessing risks and threats with layered approach to Internet of Things security [PDF]

open access: goldMeasurement + Control, 2019
Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and transportation.
Murat Aydos, Yılmaz Vural, Adem Tekerek
doaj   +2 more sources

Adapting the Presentation Layer in Rich Internet Applications [PDF]

open access: bronze, 2009
Rich Internet Applications offer Web surfers a richer user experience, mainly due to better responsiveness and enhanced user interface capabilities. In recent years, existing design methodologies targeting traditional Web 1.0 applications were extended to also support RIAs.
Irene Garrigós   +2 more
openalex   +6 more sources

A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security [PDF]

open access: goldIET Information Security, 2023
Satellite internet serves as an indispensable component of the upcoming sixth-generation networks for providing global broadband internet access service.
Yu Zhang   +5 more
doaj   +2 more sources

Proving Properties of Rich Internet Applications [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2013
We introduce application layer specifications, which allow us to reason about the state and transactions of rich Internet applications. We define variants of the state/event based logic UCTL* along with two example applications to demonstrate this ...
James Smith
doaj   +4 more sources

Cross-layer QoS Support for Multimedia Delivery over Wireless Internet

open access: goldEURASIP Journal on Advances in Signal Processing, 2005
Delivering multimedia over wireless Internet is a very challenging task. Multimedia delivery inherently has strict quality of service (QoS) requirement on bandwidth, delay, and delay jitter.
Zhang Qian, Yang Fan, Zhu Wenwu
doaj   +2 more sources

Network layer solutions for a content-centric internet [PDF]

open access: yes, 2011
Nowadays most people exploit the Internet to get contents such as web pages, music or video files. These users only value “what” they download and are not interested about “where” content is actually stored. The IP layer does the opposite and cares about
Blefari-Melazzi N, Detti A
core   +6 more sources

MAC Layer Protocols for Internet of Things: A Survey [PDF]

open access: yesFuture Internet, 2019
Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these
Luiz Oliveira   +4 more
doaj   +3 more sources

Research on Key Technologies and Applications of Energy Internet Blockchain [PDF]

open access: yesE3S Web of Conferences, 2019
In view of the challenges facing the current development of energy Internet, the basic theory, architecture implementation and application mode of energy blockchain technology are proposed from the communication layer, data layer and contract layer.
Zhu Xingxiong
doaj   +1 more source

Research on blockchain mechanism of mine Internet of things

open access: yesGong-kuang zidonghua, 2022
The mine Internet of things has the characteristics of large-scale and massive data transmission. These characteristics make the traditional network security and privacy protection methods unable to guarantee the traceability and reliability of key data.
ZHANG Liya   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy