Results 31 to 40 of about 462,961 (193)

MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks[Formula: see text].

open access: yesPLoS ONE, 2022
Fast Proxy Mobile IPv6 (FPMIPv6) is an extension of the PMIPv6 mobility management deployed as part of the next-generation internet protocol. It allows location-independent routing of IP datagrams, based on local mobility to IPv6 hosts without ...
Fikadu Degefa   +3 more
doaj   +1 more source

Розпізнавання сервісів TCP/IP за допомогою нейронних мереж [PDF]

open access: yes, 2000
В доповіді розглядаються питання підвищення рівня безпеки комп’ютерних мереж шляхом використання детекторів вторгнень. В якості методу виявлення порушень безпеки запропоновано розпізнавання аномальної поведінки сервісів TCP/IP за допомогою нейронної ...
Кащенко, Сергій   +1 more
core   +1 more source

Sicurezza nelle reti: utilizzo di architetture multi-core per il monitoraggio del traffico IP [PDF]

open access: yes, 2013
The IP packet capture activity has always assumed great importance in the computer networks security. It's daily used in fact to monitor and analyze the IP traffic passing through a computer networks with the purpose to identify anomalous behaviors that ...
Mezzalama, Marco   +2 more
core  

Institutional innovation essence and knowledge innovation goal of intellectual property law in the big data era

open access: yesJournal of Innovation & Knowledge, 2023
This work aims to expand the understanding on the nature of institutional innovation and the goal of knowledge innovation of intellectual property (IP) law in the era of big data (BD) and to avoid the risks of information security in the IP service ...
Chunling Zhang, Yumei Xu
doaj   +1 more source

Tree Parity Machine Rekeying Architectures [PDF]

open access: yes, 2005
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core   +5 more sources

Security Analysis and Improvement of Vehicle Ethernet SOME/IP Protocol

open access: yesSensors, 2022
The combination of in-vehicle networks and smart car devices has gradually developed into Intelligent Connected Vehicles (ICVs). Through the vehicle security protocol, ICVs can quickly realize communication transmission.
Jinze Du, Rui Tang, Tao Feng
doaj   +1 more source

Tiered blockchain framework: A secure, trustworthy, and cost-efficient solution for the digital rights protection

open access: yesBlockchain: Research and Applications
Protecting intellectual property (IP) in the digital age presents significant challenges due to rapid technological advancements and industrial growth. Traditional methods of registering and securing IP are becoming increasingly ineffective.
Muhammad Hanif   +5 more
doaj   +1 more source

On the security of the Mobile IP protocol family [PDF]

open access: yes, 2007
The Internet Engineering Task Force (IETF) has worked on\ud network layer mobility for more than 10 years and a number\ud of RFCs are available by now. Although the IETF mobility\ud protocols are not present in the Internet infrastructure as of\ud today,
Karagiannis, Georgios   +2 more
core   +1 more source

LTE enhancements for Public Safety and Security communications to support Group Multimedia Communications [PDF]

open access: yes, 2015
Currently Public Safety and Security communication systems rely on reliable and secure Professional Mobile Radio (PMR) Networks that are mainly devoted to provide voice services.
Carlà, Lorenzo   +4 more
core   +2 more sources

IP and the Global Public Interest: Challenges and Opportunities [PDF]

open access: yes, 2007
[Excerpt from article] Intellectual property (IP) capacity is essential for economic development, particularly as countries transition into the higher technology sectors, for example biotechnology.
Cavicchi, Jon R., Kowalski, Stanley P.
core   +1 more source

Home - About - Disclaimer - Privacy