Results 91 to 100 of about 3,084,416 (309)

SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment [PDF]

open access: yesarXiv, 2016
Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments.
arxiv  

Environmentally Stable and Highly Crystalline MXenes for Multispectral Electromagnetic Shielding up to Millimeter Waves

open access: yesAdvanced Functional Materials, EarlyView.
This study presents excellent EMI shielding effectiveness of highly crystalline HC‐Ti3C2Tx MXene, characterized by high electrical conductivity, outstanding environmental stability, and facile processability, across a multispectral frequency range from 100 kHz to 110 GHz. It is revealed that increasing the thickness and electrical conductivity of MXene
Aamir Iqbal   +13 more
wiley   +1 more source

Thermal and energy aware routing in wireless body area networks

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Unlike many other Internet of Things applications, in addition to the limited power of Internet of Medical Things devices, the safety aspect and reliability are the major concerns while designing wireless body area network routing solutions. In fact, the
Ghufran Ahmed   +2 more
doaj   +1 more source

A Sleep-Awake Scheme Based on CoAP for Energy-Efficiency in Internet of Things

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Internet Engineering Task Force (IETF) have developed Constrained Application Protocol (CoAP) to enable communication between sensor or actuator nodes in constrained environments, such as small amount of memory, and low power. IETF CoAP and HTTP are used
Wenquan Jin, DoHyeun Kim
doaj   +1 more source

A Blockchain-Based Contractual Routing Protocol for the Internet of Things Using Smart Contracts

open access: yesWireless Communications and Mobile Computing, 2018
In this paper, we propose a novel blockchain-based contractual routing (BCR) protocol for a network of untrusted IoT devices. In contrast to conventional secure routing protocols in which a central authority (CA) is required to facilitate the ...
Gholamreza Ramezan, Cyril Leung
semanticscholar   +1 more source

Organic Permeable Base Transistors—Reliable Large‐Scale Anodization for High Frequency Devices

open access: yesAdvanced Functional Materials, EarlyView.
Electrochemical anodization is optimized for organic permeable base transistors (OPBTs), achieving an unprecedented 87% yield and reproducibility for vertical organic transistors (VOTs) on a 15 x 15 cm wafer. Controlled Al base oxidation ensures a median transconductance of 10−3 S, leakage current below 10−9 A, current gain of 106, and transit ...
Amric Bonil   +8 more
wiley   +1 more source

The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET [PDF]

open access: yesInternational Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013International Journal of Computer Networks, 2013
Voice over Internet Protocol is a service from the Internet services that allows users to communicate with each other. Quality of Service is very sensitive to delay so that Voice over Internet Protocol needs it. The objective of this research is to study the effect of different queuing algorithms within the router on Voice over Internet Protocol ...
arxiv  

Butterfly‐Inspired Hierarchical Hybrid Composites for Lightweight Structural Thermal Management Applications

open access: yesAdvanced Functional Materials, EarlyView.
Emulating nature's unparalleled engineering, this work introduces butterfly‐inspired hybrid composites for high‐performance transportation and defense sectors. Leveraging biomimicry, these lightweight composites feature butterfly leg‐inspired hierarchical fibrous assemblies and butterfly wing‐inspired sandwich‐structured architecture, to achieve ...
Nello D. Sansone   +7 more
wiley   +1 more source

Inductive analysis of the Internet protocol TLS [PDF]

open access: yesACM Transactions on Information and System Security, 1999
Internet browsers use security protocols to protect sensitive messages. An inductive analysis of TLS (a descendant of SSL 3.0) has been performed using the theorem prover Isabelle. Proofs are based on higher-order logic and make no assumptions concerning beliefs of finiteness.
openaire   +4 more sources

Home - About - Disclaimer - Privacy