Results 21 to 30 of about 14,618 (242)
Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks.
Mahmood A. Al-Shareeda+3 more
doaj +1 more source
A Comprehensive Study of Accelerating IPv6 Deployment [PDF]
Since the lack of IPv6 network development, China is currently accelerating IPv6 deployment. In this scenario, traffic and network structure show a huge shift. However, due to the long-term prosperity, we are ignorant of the problems behind such outbreak of traffic and performance improvement events in accelerating deployment.
arxiv +1 more source
Authentication and Privacy Approach for DHCPv6
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients.
Ayman Al-Ani+4 more
doaj +1 more source
22nd International Conference on Computing in High Energy and Nuclear Physics, CHEP 2016, San Francisco, United States, 10 Oct 2016 - 14 Oct 2016; Journal of physics / Conference Series 898(10), 102008 - (2017).
Babik, M.+19 more
openaire +3 more sources
WLCG and IPv6 – the HEPiX IPv6 working group
The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG).
Campana, S.+28 more
openaire +2 more sources
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from ...
Mohammad A. Aladaileh+4 more
doaj +1 more source
A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art
Internet Exchange Points (IXPs) interconnect heterogeneous networks and transfer substantial traffic volumes. In the past decade, the number of IXPs has seen tremendous growth, with more operators connecting to these IXPs even though these IXPs faced ...
Abdijalil Abdullahi+2 more
doaj +1 more source
The distributed denial of service (DDoS) attack is one of the most destructive organized cyber-attacks against online services or computers on the network.
Ayman Ghaben+3 more
doaj +1 more source
An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks
IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth exploitation.
Abualhaj Mosleh M.+3 more
doaj +1 more source
Vehicular ad hoc networks (VANETs) have become increasingly common in the past decades and provides essential and efficient communication for vehicles within intelligent transportation systems. Securing the VANETs wireless communication channel is one of
Mahmood A. Al-Shareeda+3 more
doaj +1 more source