Results 131 to 140 of about 53,372 (247)
Reversible Data Hiding Techniques (RDH) play an increasingly pivotal role in the field of cybersecurity. Overlooking the properties of the carrier image and neglecting the influence of texture can lead to undesirable distortions and irreversible data ...
Dima Kasasbeh, Mohammed Anbar
doaj +1 more source
The Design of a Dynamic Configurable Packet Parser Based on FPGA. [PDF]
Sun Y, Guo Z.
europepmc +1 more source
Utilizing multiple home links in mobile IPv6 [PDF]
Hongbo Shi, Shigeki Goto
openalex +1 more source
Demonstrating Wireless IPv6 Access to a Federated Health Record Server [PDF]
D. Kalra+8 more
openalex +1 more source
Server Mobility Using Domain Name System in Mobile IPv6 Networks [PDF]
Hocheol Sung, Sunyoung Han
openalex +1 more source
IPv6具有很多 IPv4所不具备的优点 ,由 IPv4转换到 IPv6是 Internet发展的需要 .文章对混合堆栈机制、隧道技术以及 NAT- PT等实现 IPv6的工具进行了分析 .虽然有一些障碍影响了 IPv6的实现 ,但 ...
王立奎, 黄本雄
doaj
Label switching using the IPv6 address hierarchy
P. Boustead, J.F. Chicharo
openalex +2 more sources
A Study on Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment [PDF]
openalex +1 more source
Lane clearance approach for emergency vehicles in highways network. [PDF]
Khatri A, Senthilkumar M.
europepmc +1 more source
Application Research of IPv6 in Mine Industrial Ethernet
The paper introduced background and development status of IPv6, expounded development tendency and research direction of application of IPv6 in industrial Ethernet, and indicated all hardware and software based on mine industrial Ethernet should have ...
DING Yu-hui+3 more
doaj