Results 1 to 10 of about 139,659 (162)

Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks

open access: yesIEEE Access, 2017
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration,
Qi Jiang   +3 more
doaj   +3 more sources

Description of the process of tunneling Q signaling in private telecommunication networks [PDF]

open access: yesVojnotehnički Glasnik, 2021
Introduction/purpose: The article should specify the network signaling type Q-SIG, which is standardized especially for implementation in digital telecommunication networks of integrated services (ISDN), emphasizing the possibility of its further ...
Slađan M. Svrzić   +2 more
doaj   +1 more source

DESMITIFICANDO A LA DEEP WEB A TRAVÉS DE UN FUGAZ VIAJE POR LA DARK WEB

open access: yesRevista Ingeniería, Matemáticas y Ciencias de la Información, 2021
At the moment when topics related to the Deep Web and the darkNets are treated, the imagination of the one who doesn’tknow it’s reality, is projected towards a gloomy environment of the Internet, with the setting of a CiberPunk anime film ofthe nineties;
John Alexander Rico Franco
doaj   +1 more source

IoT, machine learning and photogrammetry in small hydropower towards energy and digital transition: potential energy and viability analyses

open access: yesJournal of Applied Research in Technology & Engineering, 2023
This research aims to evaluate and put into practise the design of a small hydropower plant on a stream at São Vicente, in Madeira Island, supported by internet of things (IoT).
Helena M. Ramos   +1 more
doaj   +1 more source

Authentication over Internet Protocol [PDF]

open access: yesBulletin of the Polish Academy of Sciences: Technical Sciences, 2020
Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network.
Ł. Apiecionek   +6 more
doaj   +1 more source

An Internet without the Internet protocol [PDF]

open access: yesComputer Networks, 2010
The growth of the Internet has brought about many challenges for its critical infrastructure. The DNS infrastructure, which translates mnemonic host names into IP addresses understood by the routers, is frequently the target of cache poisoning attacks.
Craig A. Shue, Minaxi Gupta
openaire   +1 more source

Implementasi Tunnel GRE pada Jaringan Ring dan Mesh Perangkat Metro-E Nokia

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2021
Tunnel merupakan teknik membangun jalur komunikasi lokal antara dua atau lebih router menggunakan jaringan IP publik. Permasalahan yang dihadapi pada sistem tunneling saat ini adalah belum adanya pedoman untuk memilih teknik yang tepat sesuai topologi ...
R. Muhammad Arifin   +2 more
doaj   +1 more source

STCP: A Novel Approach for Congestion Control in IoT Environment [PDF]

open access: yesJournal of Information Technology Management, 2022
The main idea of IoT is to connect several objects to each other through Internet. In the field of Computer Network the main problem identified by researchers is network congestion.
Ajay Kumar Gupta   +3 more
doaj   +1 more source

INTERNET PRIVACY PROTOCOLS

open access: yesZfM - Zeitschrift für Medienwissenschaft, 2023
Offenes und verdecktes Sammeln von Daten ist integraler Bestandteil des Webs. Schon früh versuchten verschiedene Initiativen, Protokolle und globale Standards für Datenschutz im Internet zu entwickeln, aber angesichts der offenen Struktur des Webs konnten sich diese Techniken, die von datenorientierten Marktakteure*innen abgelehnt wurden, nicht ...
Degeling, Martin, Human, Soheil
openaire   +1 more source

Connectable Internet Address Object Point using the Active Accessibility [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2007
This paper focuses on how building application components using Visual Basics that are accessible to people or computer users from client with disabilities.
Mohammed Hasan, Manar Ahmed
doaj   +1 more source

Home - About - Disclaimer - Privacy