Results 1 to 10 of about 3,613,979 (382)
Quantum Internet Protocol Stack: a Comprehensive Survey [PDF]
Computer Networks, vol. 213, pp. 109092, 2022, 2022Classical Internet evolved exceptionally during the last five decades, from a network comprising a few static nodes in the early days to a leviathan interconnecting billions of devices. This has been possible by the separation of concern principle, for which the network functionalities are organized as a stack of layers, each providing some ...
Jessica Illiano+3 more
arxiv +3 more sources
Security architecture for the internet protocol [PDF]
Computer Standards & Interfaces, 1998In this paper we present the design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer. The design includes three components: (1) a security policy for determining when, where, and how security measures are to be applied; (2) a modular key management
Pau-Chen Cheng+3 more
openaire +3 more sources
A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6) [PDF]
Olabenjo Babatunde , Omar Al-Debagy."A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)". International Journal of Computer Trends and Technology (IJCTT) V13(1):10-13, July 2014, 2014Many computers and devices are becoming more connected to the internet in recent years; the use of the Internet Protocol (IP) has made the connectivity and identification of these devices possible in large scale. In this paper, we will discuss the evolution of Internet Protocol version 4 (IPv4), its features, issues and limitations and how Internet ...
O. Babatunde, Omar Al-Debagy
arxiv +3 more sources
A Cryptographic Moving-Knife Cake-Cutting Protocol [PDF]
EPTCS 78, 2012, pp. 15-23, 2012This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously.
Bernd Finkbeiner+21 more
arxiv +4 more sources
A randomized waitlist-controlled pilot trial of voice over Internet protocol-delivered behavior therapy for youth with chronic tic disorders. [PDF]
J Telemed Telecare, 2016Introduction Comprehensive Behavioral Intervention for Tics (CBIT) has been shown to be efficacious for chronic tic disorders (CTDs), but utilization is limited by a lack of treatment providers and perceived financial and time burden of commuting to ...
Ricketts EJ+9 more
europepmc +2 more sources
Session Initiation Protocol Attacks and Challenges [PDF]
arXiv, 2012In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the
Keshavarz, Hassan+2 more
arxiv +2 more sources
IEEE Access, 2017
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration,
Qi Jiang+3 more
doaj +2 more sources
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration,
Qi Jiang+3 more
doaj +2 more sources
Accountable internet protocol (aip) [PDF]
ACM SIGCOMM Computer Communication Review, 2008This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding entity.
David G. Andersen+5 more
openalex +3 more sources
Securing the internet protocol [PDF]
Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing - PODC '95, 1995Pau-Chen Cheng+3 more
openalex +3 more sources
Description of the process of tunneling Q signaling in private telecommunication networks [PDF]
Vojnotehnički Glasnik, 2021Introduction/purpose: The article should specify the network signaling type Q-SIG, which is standardized especially for implementation in digital telecommunication networks of integrated services (ISDN), emphasizing the possibility of its further ...
Slađan M. Svrzić+2 more
doaj +1 more source