Results 31 to 40 of about 851,505 (288)

Performativity on the Net: “Protocological Management” and the “Societies of Control” [PDF]

open access: yesLitteraria Pragensia
In contrast to Foucault’s concept of “the political technologies of individuals,” the Internet protocol (theorised, e.g., by Alexander Galloway) can be interpreted as an instance of a political technology of “dividuals” (Gilles Deleuze).
Martin Procházka
doaj   +1 more source

A New Efficient Authenticated and Key Agreement Scheme for SIP Using Digital Signature Algorithm on Elliptic Curves

open access: yesJournal of Telecommunications and Information Technology, 2017
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone ...
Asma Jebrane   +3 more
doaj   +1 more source

Effective IoT Congestion Control Algorithm

open access: yesFuture Internet, 2023
The Internet of Things (IoT) connects devices via the Internet. Network congestion is one of the key problems that has been identified by researchers in the IoT field.
Husam H. Hasan, Zainab T. Alisa
doaj   +1 more source

Long-Range Correlations and Memory in the Dynamics of Internet Interdomain Routing

open access: yes, 2015
Data transfer is one of the main functions of the Internet. The Internet consists of a large number of interconnected subnetworks or domains, known as Autonomous Systems.
Elmokashfi, Ahmed   +3 more
core   +3 more sources

A novel scrambling algorithm for a robust WEP implementation [wired equivalent privacy protocol] [PDF]

open access: yes, 2004
Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet in the near future. However, data security and privacy remain major concerns in the current generation of wireless connectivity.
Jagetia, M, Kocak, T
core   +2 more sources

Securing Internet Protocol (IP) Storage: A Case Study

open access: yes, 2010
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast.
Murty, Ch. A. S   +1 more
core   +1 more source

Implementasi dan Analisis Performa Protokol Message Queuing Telemetry Protocol Jaringan Smart Farming Pada Budidaya Jamur Tiram Dengan Memanfaatkan Internet Of Things

open access: yesJournal of Internet and Software Engineering, 2021
– The development of technology, gives many effects for human life. Many things can be controlled automatically and remotely. Internet of Things is as one of technology development which can be a solution to make human life easier. Internet of Things can
Sidiq Rilo Pambudi, Alif Subardono
doaj   +1 more source

Diversity and complexity in neural organoids

open access: yesFEBS Letters, EarlyView.
Neural organoid research aims to expand genetic diversity on one side and increase tissue complexity on the other. Chimeroids integrate multiple donor genomes within single organoids. Self‐organising multi‐identity organoids, exogenous cell seeding, or enforced assembly of region‐specific organoids contribute to tissue complexity.
Ilaria Chiaradia, Madeline A. Lancaster
wiley   +1 more source

Development of an Internet Protocol Traceback Scheme for Denial of Service Attack Source Detection

open access: yesNigerian Journal of Technological Development, 2019
To mitigate the challenges that Flash Event (FE) poses to IP-Traceback techniques, this paper presents an IP Traceback scheme for detecting the source of a DoS attack based on Shark Smell Optimization Algorithm (SSOA).
O. W. Salami, I. J. Umoh, E. A. Adedokun
doaj   +1 more source

Protocol

open access: yesInternet Policy Review, 2022
Protocol describes a cascade of formalised standards or agreements to be implemented as control regimes for flexible material and/or semiotic organisation.
Gerd Beuster   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy