Results 161 to 170 of about 14,618 (242)

Is it possible to extend IPv6?

open access: yesComputer Communications, 2023
Ana Custura   +3 more
openaire   +1 more source

IPv6 Opportunistic Encryption

open access: yes, 2002
This paper presents an Opportunistic Encryption scheme for IPv6. Our proposal relies on IPv6 Anycast, Authorization certificates and Crypto-Based Identifier- s (CBID) to provide secure and easily deployable Opportunistic Encryption in IPv6. Unlike existing schemes, our proposal does not rely on any global Third Trusted Party (such as DNSSEC or a PKI ...
Castelluccia, Claude   +1 more
openaire   +1 more source

Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation

open access: yesJournal of King Saud University: Computer and Information Sciences
Reversible Data Hiding Techniques (RDH) play an increasingly pivotal role in the field of cybersecurity. Overlooking the properties of the carrier image and neglecting the influence of texture can lead to undesirable distortions and irreversible data ...
Dima Kasasbeh, Mohammed Anbar
doaj  

Cost analysis of IPv6 distributed mobility management protocols in comparison with TFMIPv6. [PDF]

open access: yesPLoS One
Aman M   +6 more
europepmc   +1 more source

Overview of Embedded Rust Operating Systems and Frameworks. [PDF]

open access: yesSensors (Basel)
Vandervelden T   +4 more
europepmc   +1 more source

Study on Remote Control of Machine Tool using IPv6

open access: bronze, 2004
Shigeru Hoyashita   +8 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy