Results 131 to 140 of about 462,961 (193)

Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]

open access: yesSci Rep
Dokku NS   +5 more
europepmc   +1 more source

AI in Combating Cyber Threats to Indian Pharmaceutical Intellectual Property: Legal Perspectives.

open access: yesJ Pharm Bioallied Sci
Sharma G   +5 more
europepmc   +1 more source

Secure networking using mobile IP

open access: yes
Siozios, Konstantinos   +2 more
openaire   +1 more source

Secure mobile IP using IP security primitives

Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002
As the commercial use of the Internet becomes common and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system which employs a secure mobile IP protocol on stationary security gateways and mobile hosts.
A. Inoue   +3 more
openaire   +1 more source

Secure mobile IP communication

Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks, 2002
This paper describes a solution called secure mobile IP (SecMIP) to provide mobile IP users secure access to their company's firewall protected virtual private network. The solution requires neither the introduction of new protocols nor the insertion or modification of network components.
T. Braun, M. Danzeisen
openaire   +1 more source

Quantum-Secure IP Cores

New Electronics, 2022
Xiphera launches Quantum-Secure Cryptographic IP cores
openaire   +1 more source

Conversational IP multimedia security

4th International Workshop on Mobile and Wireless Communications Network, 2003
With the introduction of 3G systems multimedia applications over wireless will become widely available to the general public. One such application will be peer-to-peer conversational multimedia communication in which voice, video, still pictures and other media can be used simultaneously and in an interactive way.
R. Blom   +4 more
openaire   +1 more source

IP Security (IPsec)

2002
Das Internet Protocol (IP) hat in den letzten Jahren alle anderen Netzwerkprotokolle weitgehend verdrangt. Die Grunde fur diesen verdienten Erfolg sind vielfaltig und reichen von der sauberen Aufgabenteilung zwischen IP und TCP (Transport Control Protocol) uber die Verbreitung von Open Source Software bis hin zum Erfolg des WWW in der Geschaftswelt.
openaire   +1 more source

Home - About - Disclaimer - Privacy