Results 31 to 40 of about 5,465,959 (370)

Security Model for TCP/IP Protocol Suite

open access: yesJournal of Advances in Information Technology, 2011
the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet.  Internet usage continues to increase exponentially.
Anand Kumar, S. Karthikeyan
doaj   +1 more source

A cross‐layer anti‐jamming method in satellite Internet

open access: yesIET Communications, 2023
In view of the diverse jamming environment, the single‐level anti‐jamming method faces some challenges such as poor timeliness, high cost and poor effect.
Peijie Yan   +3 more
doaj   +1 more source

High-speed, in-band performance measurement instrumentation for next generation IP networks [PDF]

open access: yes, 2010
Facilitating always-on instrumentation of Internet traffic for the purposes of performance measurement is crucial in order to enable accountability of resource usage and automated network control, management and optimisation.
Aweya   +6 more
core   +1 more source

Multi-layer virtual transport network design [PDF]

open access: yes, 2017
Service overlay networks and network virtualization enable multiple overlay/virtual networks to run over a common physical network infrastructure.
Matta, Ibrahim, Wang, Yuefeng
core   +2 more sources

SafeCity: Toward Safe and Secured Data Management Design for IoT-Enabled Smart City Planning

open access: yesIEEE Access, 2020
The interaction among different Internet of Things (IoT) sensors and devices become massive and insecure over the Internet as we probe to smart cities. These heterogeneous devices produce an enormous amount of data that is vulnerable to various malicious
Hui Zhang   +5 more
doaj   +1 more source

Internet of Things for Smart Cities

open access: yesIEEE Internet of Things Journal, 2014
The Internet of Things (IoT) shall be able to incorporate transparently and seamlessly a large number of different and heterogeneous end systems, while providing open access to selected subsets of data for the development of a plethora of digital ...
A. Zanella   +4 more
semanticscholar   +1 more source

Adapting the Presentation Layer in Rich Internet Applications [PDF]

open access: yes, 2009
Rich Internet Applications offer Web surfers a richer user experience, mainly due to better responsiveness and enhanced user interface capabilities. In recent years, existing design methodologies targeting traditional Web 1.0 applications were extended to also support RIAs.
Garrigós, Irene   +2 more
openaire   +3 more sources

Performance, privacy and security issues at the TCP internet layer

open access: yesWorld Journal of Advanced Research and Reviews
The rapid growth of internet-based services and applications has revolutionized the way we communicate, interact, and conduct business. However, this widespread connectivity also brings forth numerous challenges related to performance and privacy ...
Ogweno Jeremiah
semanticscholar   +1 more source

A novel middleware for the mobility management over the Internet [PDF]

open access: yes, 2008
The features of mobility, which enormously impact on how communication is evolving into the future, represent a particular challenge in today’s wireless networking research. After an identification and evaluation of the gap between the discontinuities of
Diaz, Michel   +3 more
core   +2 more sources

Overview of Trusted Authentication and Incentive Mechanisms in Blockchain-Based Internet of Vehicles [PDF]

open access: yesJisuanji kexue yu tansuo
With the increasing demand for data sharing in the Internet of vehicles, reliable identity authentication protocols and scientifically rational incentive mechanisms have become the primary conditions for ensuring the stable operation of the Internet of ...
GAO Chunqi, LI Leixiao, SHI Jianping
doaj   +1 more source

Home - About - Disclaimer - Privacy