Results 131 to 140 of about 462,961 (193)
Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]
Dokku NS +5 more
europepmc +1 more source
AI in Combating Cyber Threats to Indian Pharmaceutical Intellectual Property: Legal Perspectives.
Sharma G +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Secure mobile IP using IP security primitives
Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002As the commercial use of the Internet becomes common and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system which employs a secure mobile IP protocol on stationary security gateways and mobile hosts.
A. Inoue +3 more
openaire +1 more source
Secure mobile IP communication
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks, 2002This paper describes a solution called secure mobile IP (SecMIP) to provide mobile IP users secure access to their company's firewall protected virtual private network. The solution requires neither the introduction of new protocols nor the insertion or modification of network components.
T. Braun, M. Danzeisen
openaire +1 more source
New Electronics, 2022
Xiphera launches Quantum-Secure Cryptographic IP cores
openaire +1 more source
Xiphera launches Quantum-Secure Cryptographic IP cores
openaire +1 more source
Conversational IP multimedia security
4th International Workshop on Mobile and Wireless Communications Network, 2003With the introduction of 3G systems multimedia applications over wireless will become widely available to the general public. One such application will be peer-to-peer conversational multimedia communication in which voice, video, still pictures and other media can be used simultaneously and in an interactive way.
R. Blom +4 more
openaire +1 more source
2002
Das Internet Protocol (IP) hat in den letzten Jahren alle anderen Netzwerkprotokolle weitgehend verdrangt. Die Grunde fur diesen verdienten Erfolg sind vielfaltig und reichen von der sauberen Aufgabenteilung zwischen IP und TCP (Transport Control Protocol) uber die Verbreitung von Open Source Software bis hin zum Erfolg des WWW in der Geschaftswelt.
openaire +1 more source
Das Internet Protocol (IP) hat in den letzten Jahren alle anderen Netzwerkprotokolle weitgehend verdrangt. Die Grunde fur diesen verdienten Erfolg sind vielfaltig und reichen von der sauberen Aufgabenteilung zwischen IP und TCP (Transport Control Protocol) uber die Verbreitung von Open Source Software bis hin zum Erfolg des WWW in der Geschaftswelt.
openaire +1 more source

