Results 101 to 110 of about 14,303 (202)

5G Security Threat Assessment in Real Networks. [PDF]

open access: yesSensors (Basel), 2021
Park S   +5 more
europepmc   +1 more source

Developing a Framework to Implement Public Key Infrastructure Enabled Security in XML Documents

open access: yes, 2003
This paper concentrates on proposing a framework to implement the PKI enables security in XML documents, by defining a common framework and processing rules that can be shared across applications using common tools, avoiding the need for extensive ...
Alvi, Fawaz   +2 more
core  

Design on Cloud Computing Application Platform Based on CDMA VPDN

open access: yesDianxin kexue, 2013
In order to meet the express deployment of mobile application, the cloud computing platform is used to integrate traditional leased line and platform.
Min Cai
doaj   +2 more sources

Vulnerability to shear stress caused by altered peri-endothelial matrix is a key feature of Moyamoya disease. [PDF]

open access: yesSci Rep, 2021
Matsuo M   +11 more
europepmc   +1 more source

Application and Development of QKD-Based Quantum Secure Communication. [PDF]

open access: yesEntropy (Basel), 2023
Lai J   +6 more
europepmc   +1 more source

Assessing Industrial Communication Protocols to Bridge the Gap between Machine Tools and Software Monitoring. [PDF]

open access: yesSensors (Basel), 2023
Tapia E   +4 more
europepmc   +1 more source

IPsec Clustering [PDF]

open access: yes, 2004
Antti Nuopponen   +2 more
openaire   +1 more source

The MadQCI Cloud Scenario: Quantum as a Service. [PDF]

open access: yesEntropy (Basel)
Buruaga JS   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy