Results 31 to 40 of about 101,280 (178)
Internet security for mobile computing [PDF]
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core +1 more source
Path Aware Transport Layer Solution for Mobile Networks
The revolutionary Fifth Generation (5G) network technology has already been deployed in many countries to provide end-to-end quality-of-service for a wide variety of services, applications, and users with extremely diverse requirements. To accomplish the
Shiva Souhith Gantha +3 more
doaj +1 more source
De-ossifying the Internet Transport Layer : A Survey and Future Perspectives [PDF]
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their useful suggestions and comments.Peer reviewedPublisher ...
Brunstrom, Anna +10 more
core +1 more source
Post-COVID condition or “long COVID”, return-to work, and occupational health research
Since the beginning of the COVID-19 pandemic, there has been a growing literature on COVID and work (1). Major editorials (2–4) and reports from international associations and agencies (5–8) have highlighted the importance of ...
Alexis Descatha +2 more
doaj +1 more source
CoAP conformance testing based on TTCN-3
Protocol conformance test is of great importance in making sure that the protocol implementations conform to the protocol specification,thus helps protocol implementer to improve the implementations.CoAP (constrained application protocol) is a generic ...
Hong-qing DU +2 more
doaj +2 more sources
Ontology generation for flight safety messages in air traffic management
The analysis of various data is a challenging issue in the field of air traffic flow management (ATFM). Managing a large volume of data and their correct interpretation plays a key role in the prevention of air accidents, human errors, and flight ...
Mahdi Yousefzadeh Aghdam +3 more
doaj +1 more source
DTLS Performance in Duty-Cycled Networks [PDF]
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent +6 more
core +4 more sources
Surfing the Internet-of-Things: lightweight access and control of wireless sensor networks using industrial low power protocols [PDF]
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as ...
Leung, Victor C M +2 more
core +1 more source
NewIP:new connectivity and capabilities of upgrading future data network
Internet applications deeply affect people’s work and life.As the booming of internet applications,the data network faces more and more challenges.Based on the requirements of future applications,the trend for inheritance development based on traditional
Xiuli ZHENG, Sheng JIANG, Chuang WANG
doaj +2 more sources
A Public Law Approach to Internet Standard Setting
This article lays the foundations of a comprehensive analysis of the legitimacy of global Internet governance institutions from the perspective of public law.
Biel Company
doaj +1 more source

