Results 271 to 280 of about 3,084,416 (309)
Some of the next articles are maybe not open access.

CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles

IEEE Internet of Things Journal, 2019
The conditional privacy-preserving authentication (CPPA) protocol has applications in the construction of secure Internet of Vehicles (IoV) due to its capability to achieve both privacy preservation and authentication simultaneously.
Jiliang Li   +3 more
semanticscholar   +1 more source

Internet Protocol Television

2008
This chapter focuses on evaluating Internet protocol television (IPTV) business models from different service providers through the prism of the Star Model. The tool is based on Porter’s five forces, as developed by M.E. Porter. The Star Model extends the five Forces into a set of metrics to evaluate current and future business offerings.
Kate Carney Landow   +6 more
openaire   +1 more source

The Internet Stream Protocol [PDF]

open access: possible, 1996
ST, the Internet Stream Protocol, is perhaps the oldest communication protocol designed for speech communication over packet-switched networks. It has been developed by Danny Cohen, Estil Hoversten, and Jim Forgie of the M.I.T. Lincoln Laboratory. Jim Forgie is the author of the ST protocol specifications completed in September 1979 [Forg79].
openaire   +1 more source

Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things

IEEE Internet of Things Journal, 2018
The concept of the Social Internet of Things (SIoT) can be viewed as the integration of prevailing social networking and the Internet of Things, which is making inroads into the daily operation of many industries.
Jian Shen   +4 more
semanticscholar   +1 more source

Internet Routing Protocols

1999
Routers filter the network traffic so that the only traffic that flows into and out of a network is required to go into a network. In many cases, there are several possible routes that can be taken between to nodes on different networks. Consider the network in Figure 36.1.
openaire   +2 more sources

NSAC: A Novel Clustering Protocol in Cognitive Radio Sensor Networks for Internet of Things

IEEE Internet of Things Journal, 2019
Clustering is an effective method to manage communications in cognitive radio sensor networks (CRSNs). This letter proposes a network stability-aware clustering (NSAC) protocol for CRSNs.
M. Zheng, Si Chen, W. Liang, Min Song
semanticscholar   +1 more source

Mobile Internet protocol

IEEE Potentials, 2001
The Internet works on a simple principle. The two endpoints are essentially stationary computers. The IP routes the packets of data from source to destination with the help of routers. This forwarding of packets by the routers is done depending upon the contents of their router tables.
openaire   +2 more sources

Internet of Things: Survey and open issues of MQTT protocol

2017 International Conference on Engineering & MIS (ICEMIS), 2017
Internet of Things (IoT) is based on a wireless network that connects a huge number of smart objects, products, smart devices, and people. It has another name which is Web of Things (WoT).
M. B. Yassein   +3 more
semanticscholar   +1 more source

Optimization model of internet protocols

Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 2005
Layered architecture is one of the most fundamental and influential structures of network design. Can we integrate the various protocol layers into a single coherent theory by regarding them as carrying out an asynchronous distributed primal-dual computation over the network to implicitly solve a global optimization problem? Different layers iterate on
Low, Steven   +4 more
openaire   +3 more sources

Chord: A scalable peer-to-peer lookup service for internet applications

Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2001
A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one
Ion Stoica   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy