Results 31 to 40 of about 90,307 (120)

NewIP:new connectivity and capabilities of upgrading future data network

open access: yesDianxin kexue, 2019
Internet applications deeply affect people’s work and life.As the booming of internet applications,the data network faces more and more challenges.Based on the requirements of future applications,the trend for inheritance development based on traditional
Xiuli ZHENG, Sheng JIANG, Chuang WANG
doaj   +2 more sources

AoI-Based Multicast Routing Over Voronoi Overlays With Minimal Overhead

open access: yesIEEE Access, 2020
The increasing pervasive and ubiquitous presence of devices at the edge of the Internet is creating new scenarios for the emergence of novel services and applications. This is particularly true for location and context-aware services. These services call
Michele Albano   +2 more
doaj   +1 more source

DTLS Performance in Duty-Cycled Networks [PDF]

open access: yes, 2015
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent   +6 more
core   +4 more sources

Observing the Evolution of QUIC Implementations

open access: yes, 2018
The QUIC protocol combines features that were initially found inside the TCP, TLS and HTTP/2 protocols. The IETF is currently finalising a complete specification of this protocol.
Bonaventure, Olivier   +2 more
core   +1 more source

Comparing P2PTV Traffic Classifiers [PDF]

open access: yes, 2010
Peer-to-Peer IP Television (P2PTV) applications represent one of the fastest growing application classes on the Internet, both in terms of their popularity and in terms of the amount of traffic they generate.
Cascarano, Niccolo'   +6 more
core   +1 more source

Propuesta de inclusión del criptosistema triple des 96en ssl/tls record protocol [PDF]

open access: yes, 2014
TESIS DE INVESTIGACIÓN CIENTIFICA EL PRESENTE TRABAJO DE INVESTIGACIÓN SE CENTRA EN EL SSL/TLS RECORD PROTOCOL DONDE SE CONSTRUYE LA INCLUSIÓN DE TRIPLE DES 96 EN LA MENCIONADA SUITE DE CIFRADODebido a la seguridad requerida al momento de intercambiar ...
FILIO AGUILAR, PEDRO DAVID   +1 more
core  

Effective Caching for the Secure Content Distribution in Information-Centric Networking

open access: yes, 2018
The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective ...
Bilal, Muhammad   +2 more
core   +1 more source

IP Links in multihop ad hoc wireless networks? [PDF]

open access: yes, 2009
International audienceA number of efforts currently aim at scalable and efficient mobile ad hoc routing, an essential piece concerning the integration of such networks in the Internet.
Baccelli, Emmanuel   +3 more
core   +2 more sources

TrusNet: Peer-to-Peer Cryptographic Authentication [PDF]

open access: yes, 2016
Originally, the Internet was meant as a general purpose communication protocol, transferring primarily text documents between interested parties. Over time, documents expanded to include pictures, videos and even web pages.
Bedard, Adrian, Bedard, Jonathan
core   +1 more source

Home - About - Disclaimer - Privacy