Results 1 to 10 of about 3,084,416 (309)

Quantum Internet Protocol Stack: a Comprehensive Survey [PDF]

open access: yesComputer Networks, vol. 213, pp. 109092, 2022, 2022
Classical Internet evolved exceptionally during the last five decades, from a network comprising a few static nodes in the early days to a leviathan interconnecting billions of devices. This has been possible by the separation of concern principle, for which the network functionalities are organized as a stack of layers, each providing some ...
Jessica Illiano   +3 more
arxiv   +3 more sources

Security architecture for the internet protocol [PDF]

open access: yesComputer Standards & Interfaces, 1998
In this paper we present the design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer. The design includes three components: (1) a security policy for determining when, where, and how security measures are to be applied; (2) a modular key management
Pau-Chen Cheng   +3 more
openaire   +3 more sources

A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6) [PDF]

open access: yesOlabenjo Babatunde , Omar Al-Debagy."A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)". International Journal of Computer Trends and Technology (IJCTT) V13(1):10-13, July 2014, 2014
Many computers and devices are becoming more connected to the internet in recent years; the use of the Internet Protocol (IP) has made the connectivity and identification of these devices possible in large scale. In this paper, we will discuss the evolution of Internet Protocol version 4 (IPv4), its features, issues and limitations and how Internet ...
O. Babatunde, Omar Al-Debagy
arxiv   +3 more sources

A randomized waitlist-controlled pilot trial of voice over Internet protocol-delivered behavior therapy for youth with chronic tic disorders. [PDF]

open access: yesJ Telemed Telecare, 2016
Introduction Comprehensive Behavioral Intervention for Tics (CBIT) has been shown to be efficacious for chronic tic disorders (CTDs), but utilization is limited by a lack of treatment providers and perceived financial and time burden of commuting to ...
Ricketts EJ   +9 more
europepmc   +2 more sources

Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks

open access: yesIEEE Access, 2017
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration,
Qi Jiang   +3 more
doaj   +2 more sources

Description of the process of tunneling Q signaling in private telecommunication networks [PDF]

open access: yesVojnotehnički Glasnik, 2021
Introduction/purpose: The article should specify the network signaling type Q-SIG, which is standardized especially for implementation in digital telecommunication networks of integrated services (ISDN), emphasizing the possibility of its further ...
Slađan M. Svrzić   +2 more
doaj   +1 more source

IoT, machine learning and photogrammetry in small hydropower towards energy and digital transition: potential energy and viability analyses

open access: yesJournal of Applied Research in Technology & Engineering, 2023
This research aims to evaluate and put into practise the design of a small hydropower plant on a stream at São Vicente, in Madeira Island, supported by internet of things (IoT).
Helena M. Ramos   +1 more
doaj   +1 more source

INTERNET PRIVACY PROTOCOLS

open access: yesZfM - Zeitschrift für Medienwissenschaft, 2023
Offenes und verdecktes Sammeln von Daten ist integraler Bestandteil des Webs. Schon früh versuchten verschiedene Initiativen, Protokolle und globale Standards für Datenschutz im Internet zu entwickeln, aber angesichts der offenen Struktur des Webs konnten sich diese Techniken, die von datenorientierten Marktakteure*innen abgelehnt wurden, nicht ...
Degeling, Martin, Human, Soheil
openaire   +1 more source

Authentication over Internet Protocol [PDF]

open access: yesBulletin of the Polish Academy of Sciences: Technical Sciences, 2020
Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network.
Ł. Apiecionek   +6 more
doaj   +1 more source

An alternative hyper-Poisson integer-valued GARCH model with application to polio, internet protocol and COVID-19 data

open access: yesAIMS Mathematics, 2023
Time series of counts are observed widely in actuarial science, finance, epidemiology and biology. These time series may exhibit over-, equi- and under-dispersion.
Kee Wah Fo   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy