Results 271 to 280 of about 3,084,416 (309)
Some of the next articles are maybe not open access.
IEEE Internet of Things Journal, 2019
The conditional privacy-preserving authentication (CPPA) protocol has applications in the construction of secure Internet of Vehicles (IoV) due to its capability to achieve both privacy preservation and authentication simultaneously.
Jiliang Li+3 more
semanticscholar +1 more source
The conditional privacy-preserving authentication (CPPA) protocol has applications in the construction of secure Internet of Vehicles (IoV) due to its capability to achieve both privacy preservation and authentication simultaneously.
Jiliang Li+3 more
semanticscholar +1 more source
2008
This chapter focuses on evaluating Internet protocol television (IPTV) business models from different service providers through the prism of the Star Model. The tool is based on Porter’s five forces, as developed by M.E. Porter. The Star Model extends the five Forces into a set of metrics to evaluate current and future business offerings.
Kate Carney Landow+6 more
openaire +1 more source
This chapter focuses on evaluating Internet protocol television (IPTV) business models from different service providers through the prism of the Star Model. The tool is based on Porter’s five forces, as developed by M.E. Porter. The Star Model extends the five Forces into a set of metrics to evaluate current and future business offerings.
Kate Carney Landow+6 more
openaire +1 more source
The Internet Stream Protocol [PDF]
ST, the Internet Stream Protocol, is perhaps the oldest communication protocol designed for speech communication over packet-switched networks. It has been developed by Danny Cohen, Estil Hoversten, and Jim Forgie of the M.I.T. Lincoln Laboratory. Jim Forgie is the author of the ST protocol specifications completed in September 1979 [Forg79].
openaire +1 more source
Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things
IEEE Internet of Things Journal, 2018The concept of the Social Internet of Things (SIoT) can be viewed as the integration of prevailing social networking and the Internet of Things, which is making inroads into the daily operation of many industries.
Jian Shen+4 more
semanticscholar +1 more source
1999
Routers filter the network traffic so that the only traffic that flows into and out of a network is required to go into a network. In many cases, there are several possible routes that can be taken between to nodes on different networks. Consider the network in Figure 36.1.
openaire +2 more sources
Routers filter the network traffic so that the only traffic that flows into and out of a network is required to go into a network. In many cases, there are several possible routes that can be taken between to nodes on different networks. Consider the network in Figure 36.1.
openaire +2 more sources
NSAC: A Novel Clustering Protocol in Cognitive Radio Sensor Networks for Internet of Things
IEEE Internet of Things Journal, 2019Clustering is an effective method to manage communications in cognitive radio sensor networks (CRSNs). This letter proposes a network stability-aware clustering (NSAC) protocol for CRSNs.
M. Zheng, Si Chen, W. Liang, Min Song
semanticscholar +1 more source
IEEE Potentials, 2001
The Internet works on a simple principle. The two endpoints are essentially stationary computers. The IP routes the packets of data from source to destination with the help of routers. This forwarding of packets by the routers is done depending upon the contents of their router tables.
openaire +2 more sources
The Internet works on a simple principle. The two endpoints are essentially stationary computers. The IP routes the packets of data from source to destination with the help of routers. This forwarding of packets by the routers is done depending upon the contents of their router tables.
openaire +2 more sources
Internet of Things: Survey and open issues of MQTT protocol
2017 International Conference on Engineering & MIS (ICEMIS), 2017Internet of Things (IoT) is based on a wireless network that connects a huge number of smart objects, products, smart devices, and people. It has another name which is Web of Things (WoT).
M. B. Yassein+3 more
semanticscholar +1 more source
Optimization model of internet protocols
Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 2005Layered architecture is one of the most fundamental and influential structures of network design. Can we integrate the various protocol layers into a single coherent theory by regarding them as carrying out an asynchronous distributed primal-dual computation over the network to implicitly solve a global optimization problem? Different layers iterate on
Low, Steven+4 more
openaire +3 more sources
Chord: A scalable peer-to-peer lookup service for internet applications
Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2001A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one
Ion Stoica+4 more
semanticscholar +1 more source