Results 1 to 10 of about 3,613,979 (382)

Quantum Internet Protocol Stack: a Comprehensive Survey [PDF]

open access: yesComputer Networks, vol. 213, pp. 109092, 2022, 2022
Classical Internet evolved exceptionally during the last five decades, from a network comprising a few static nodes in the early days to a leviathan interconnecting billions of devices. This has been possible by the separation of concern principle, for which the network functionalities are organized as a stack of layers, each providing some ...
Jessica Illiano   +3 more
arxiv   +3 more sources

Security architecture for the internet protocol [PDF]

open access: yesComputer Standards & Interfaces, 1998
In this paper we present the design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer. The design includes three components: (1) a security policy for determining when, where, and how security measures are to be applied; (2) a modular key management
Pau-Chen Cheng   +3 more
openaire   +3 more sources

A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6) [PDF]

open access: yesOlabenjo Babatunde , Omar Al-Debagy."A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)". International Journal of Computer Trends and Technology (IJCTT) V13(1):10-13, July 2014, 2014
Many computers and devices are becoming more connected to the internet in recent years; the use of the Internet Protocol (IP) has made the connectivity and identification of these devices possible in large scale. In this paper, we will discuss the evolution of Internet Protocol version 4 (IPv4), its features, issues and limitations and how Internet ...
O. Babatunde, Omar Al-Debagy
arxiv   +3 more sources

A Cryptographic Moving-Knife Cake-Cutting Protocol [PDF]

open access: yesEPTCS 78, 2012, pp. 15-23, 2012
This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously.
Bernd Finkbeiner   +21 more
arxiv   +4 more sources

A randomized waitlist-controlled pilot trial of voice over Internet protocol-delivered behavior therapy for youth with chronic tic disorders. [PDF]

open access: yesJ Telemed Telecare, 2016
Introduction Comprehensive Behavioral Intervention for Tics (CBIT) has been shown to be efficacious for chronic tic disorders (CTDs), but utilization is limited by a lack of treatment providers and perceived financial and time burden of commuting to ...
Ricketts EJ   +9 more
europepmc   +2 more sources

Session Initiation Protocol Attacks and Challenges [PDF]

open access: yesarXiv, 2012
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the
Keshavarz, Hassan   +2 more
arxiv   +2 more sources

Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks

open access: yesIEEE Access, 2017
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration,
Qi Jiang   +3 more
doaj   +2 more sources

Accountable internet protocol (aip) [PDF]

open access: greenACM SIGCOMM Computer Communication Review, 2008
This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding entity.
David G. Andersen   +5 more
openalex   +3 more sources

Securing the internet protocol [PDF]

open access: bronzeProceedings of the fourteenth annual ACM symposium on Principles of distributed computing - PODC '95, 1995
Pau-Chen Cheng   +3 more
openalex   +3 more sources

Description of the process of tunneling Q signaling in private telecommunication networks [PDF]

open access: yesVojnotehnički Glasnik, 2021
Introduction/purpose: The article should specify the network signaling type Q-SIG, which is standardized especially for implementation in digital telecommunication networks of integrated services (ISDN), emphasizing the possibility of its further ...
Slađan M. Svrzić   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy