Results 11 to 20 of about 462,961 (193)
The research problem described in this article is related to the security of an IP network that is set up between two cities using hosting. The network is used for transmitting telephone traffic between servers located in Germany and the Netherlands. The
Mubarak Yakubova +4 more
doaj +1 more source
Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework [PDF]
IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one aspect of this improvement is to take Quality of Service (QoS) requirements ...
Fraboul, Christian +2 more
core +3 more sources
This paper investigates the security–reliability of simultaneous wireless information and power transfer (SWIPT)-assisted amplify-and-forward (AF) full-duplex (FD) relay networks.
Tan N. Nguyen +6 more
doaj +1 more source
Although network security is a common concern in almost every network, it appears that no general model for building safe networks has been proposed. The existing models lack a comprehensive approach to the challenges that need to be faced by a modern, publicly accessible IT system. Such approach requires basing on modern access techniques and security
Łukasz Apiecionek, Michał Romantowski
openaire +1 more source
Security Model for TCP/IP Protocol Suite
the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet. Internet usage continues to increase exponentially.
Anand Kumar, S. Karthikeyan
doaj +1 more source
Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks
In recent years, Ethernet has been introduced into vehicular networks to cope with the increasing demand for bandwidth and complexity in communication networks.
Zheng Zuo +7 more
doaj +1 more source
SCM : Secure Code Memory Architecture [PDF]
An increasing number of applications implemented on a SoC (System-on-chip) require security features. This work addresses the issue of protecting the integrity of code and read-only data that is stored in memory.
de Clercq, Ruan +5 more
core +2 more sources
DESIGN AND IMPLEMENTATION OF A TRANSPARENT SECURE LAN
Many attacks may be carried out against communications in Local Area Networks (LANs). However, these attacks can be prevented, or detected, by providing confidentiality, authentication, and data integrity security services to the exchanged data.
Sufyan T. Faraj, Firas R. Barjas
doaj +1 more source
An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP
The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats.
Bin Ma +7 more
doaj +1 more source
It is a well-known fact that design productivity is failing to keep pace with the big increase in the demands of applications and advanced silicon technology, especially in the domain of portable electronics.
Anirban Sengupta +3 more
doaj +1 more source

