Results 31 to 40 of about 101,280 (178)

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

Path Aware Transport Layer Solution for Mobile Networks

open access: yesIEEE Access, 2020
The revolutionary Fifth Generation (5G) network technology has already been deployed in many countries to provide end-to-end quality-of-service for a wide variety of services, applications, and users with extremely diverse requirements. To accomplish the
Shiva Souhith Gantha   +3 more
doaj   +1 more source

De-ossifying the Internet Transport Layer : A Survey and Future Perspectives [PDF]

open access: yes, 2016
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their useful suggestions and comments.Peer reviewedPublisher ...
Brunstrom, Anna   +10 more
core   +1 more source

Post-COVID condition or “long COVID”, return-to work, and occupational health research

open access: yesScandinavian Journal of Work, Environment & Health, 2023
Since the beginning of the COVID-19 pandemic, there has been a growing literature on COVID and work (1). Major editorials (2–4) and reports from international associations and agencies (5–8) have highlighted the importance of ...
Alexis Descatha   +2 more
doaj   +1 more source

CoAP conformance testing based on TTCN-3

open access: yesTongxin xuebao, 2013
Protocol conformance test is of great importance in making sure that the protocol implementations conform to the protocol specification,thus helps protocol implementer to improve the implementations.CoAP (constrained application protocol) is a generic ...
Hong-qing DU   +2 more
doaj   +2 more sources

Ontology generation for flight safety messages in air traffic management

open access: yesJournal of Big Data, 2021
The analysis of various data is a challenging issue in the field of air traffic flow management (ATFM). Managing a large volume of data and their correct interpretation plays a key role in the prevention of air accidents, human errors, and flight ...
Mahdi Yousefzadeh Aghdam   +3 more
doaj   +1 more source

DTLS Performance in Duty-Cycled Networks [PDF]

open access: yes, 2015
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent   +6 more
core   +4 more sources

Surfing the Internet-of-Things: lightweight access and control of wireless sensor networks using industrial low power protocols [PDF]

open access: yes, 2014
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as ...
Leung, Victor C M   +2 more
core   +1 more source

NewIP:new connectivity and capabilities of upgrading future data network

open access: yesDianxin kexue, 2019
Internet applications deeply affect people’s work and life.As the booming of internet applications,the data network faces more and more challenges.Based on the requirements of future applications,the trend for inheritance development based on traditional
Xiuli ZHENG, Sheng JIANG, Chuang WANG
doaj   +2 more sources

A Public Law Approach to Internet Standard Setting

open access: yesGöttingen Journal of International Law, 2016
This article lays the foundations of a comprehensive analysis of the legitimacy of global Internet governance institutions from the perspective of public law.
Biel Company
doaj   +1 more source

Home - About - Disclaimer - Privacy