Results 31 to 40 of about 90,307 (120)
NewIP:new connectivity and capabilities of upgrading future data network
Internet applications deeply affect people’s work and life.As the booming of internet applications,the data network faces more and more challenges.Based on the requirements of future applications,the trend for inheritance development based on traditional
Xiuli ZHENG, Sheng JIANG, Chuang WANG
doaj +2 more sources
AoI-Based Multicast Routing Over Voronoi Overlays With Minimal Overhead
The increasing pervasive and ubiquitous presence of devices at the edge of the Internet is creating new scenarios for the emergence of novel services and applications. This is particularly true for location and context-aware services. These services call
Michele Albano+2 more
doaj +1 more source
DTLS Performance in Duty-Cycled Networks [PDF]
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent+6 more
core +4 more sources
IETF Protocol Suite for the Internet of Things: Overview and Recent Advancements [PDF]
Roberto Morabito, Jaime Jiménez
+5 more sources
Observing the Evolution of QUIC Implementations
The QUIC protocol combines features that were initially found inside the TCP, TLS and HTTP/2 protocols. The IETF is currently finalising a complete specification of this protocol.
Bonaventure, Olivier+2 more
core +1 more source
Comparing P2PTV Traffic Classifiers [PDF]
Peer-to-Peer IP Television (P2PTV) applications represent one of the fastest growing application classes on the Internet, both in terms of their popularity and in terms of the amount of traffic they generate.
Cascarano, Niccolo'+6 more
core +1 more source
Propuesta de inclusión del criptosistema triple des 96en ssl/tls record protocol [PDF]
TESIS DE INVESTIGACIÓN CIENTIFICA EL PRESENTE TRABAJO DE INVESTIGACIÓN SE CENTRA EN EL SSL/TLS RECORD PROTOCOL DONDE SE CONSTRUYE LA INCLUSIÓN DE TRIPLE DES 96 EN LA MENCIONADA SUITE DE CIFRADODebido a la seguridad requerida al momento de intercambiar ...
FILIO AGUILAR, PEDRO DAVID+1 more
core
Effective Caching for the Secure Content Distribution in Information-Centric Networking
The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective ...
Bilal, Muhammad+2 more
core +1 more source
IP Links in multihop ad hoc wireless networks? [PDF]
International audienceA number of efforts currently aim at scalable and efficient mobile ad hoc routing, an essential piece concerning the integration of such networks in the Internet.
Baccelli, Emmanuel+3 more
core +2 more sources
TrusNet: Peer-to-Peer Cryptographic Authentication [PDF]
Originally, the Internet was meant as a general purpose communication protocol, transferring primarily text documents between interested parties. Over time, documents expanded to include pictures, videos and even web pages.
Bedard, Adrian, Bedard, Jonathan
core +1 more source