Results 1 to 10 of about 3,844,272 (337)

New enhanced authentication protocol for Internet of Things

open access: yesBig Data Mining and Analytics, 2021
Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely.
Mourade Azrour   +3 more
semanticscholar   +1 more source

A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care

open access: yesIEEE Internet of Things Journal, 2020
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the doctors to remotely diagnose the patients, control the medical equipment, and monitor the quarantined patients through their digital devices.
Mehedi Masud   +6 more
semanticscholar   +1 more source

Voice quality estimation in combined radio-VoIP networks for dispatching systems [PDF]

open access: yes, 2016
The voice quality modelling assessment and planning field is deeply and widely theoretically and practically mastered for common voice communication systems, especially for the public fixed and mobile telephone networks including Next Generation Networks
Kučerák, Ján, Vodrážka, Jiří
core   +1 more source

Dovetail: Stronger Anonymity in Next-Generation Internet Routing [PDF]

open access: yes, 2014
Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than obfuscating network identity through higher
A. Acquisti   +5 more
core   +3 more sources

Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security

open access: yesIEEE Security and Privacy, 2019
Internet of Things (IoT) deployments expand as IoT security lags. This article surveys IoT security protocols standardized by the Internet Engineering Task Force and discusses remaining gaps.
H. Tschofenig, E. Baccelli
semanticscholar   +1 more source

A program to help students of life sciences prepare a research protocol [PDF]

open access: yes, 2002
This paper describes a Web‐based program that has been written in JavaScript to help honours‐level students to design a protocol for their research project.
Wise, Alan
core   +2 more sources

The QUIC Transport Protocol: Design and Internet-Scale Deployment

open access: yesConference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2017
We present our experience with QUIC, an encrypted, multiplexed, and low-latency transport protocol designed from the ground up to improve transport performance for HTTPS traffic and to enable rapid deployment and continued evolution of transport ...
Adam Langley   +20 more
semanticscholar   +1 more source

Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks [PDF]

open access: yes, 2003
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit ...
Argyraki, Katerina J.   +1 more
core   +3 more sources

Lightweight Authentication Protocol in Internet-of-Things

open access: yesInternational Journal of Scientific Research in Computer Science Engineering and Information Technology, 2020
Internet of Things is the extension of Internet connectivity into physical devices, called IoT devices which are connected to Cloud Servers, which help them perform many functions, including, but not limited to security protocols.
Anamika A. Mishra   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy