Results 11 to 20 of about 419,821 (262)

BSBI – a Simple Protocol for Remote Verification of Identity

open access: yesJournal of Telecommunications and Information Technology, 2012
The paper presents the design and the rationale behind a simple verification protocol for autonomous verification modules, and the architecture enabling use of such modules.
Tomasz Pałka, Adam Kozakiewicz
doaj   +1 more source

Marine Network Protocols and Security Risks

open access: yesJournal of Cybersecurity and Privacy, 2021
Marine network protocols are domain-specific network protocols that aim to incorporate particular features within the specialized marine context that devices are implemented in.
Ky Tran   +3 more
doaj   +1 more source

1991 and networked interoperability

open access: yesLiber Quarterly: The Journal of European Research Libraries, 2017
1991, the year of the first call in the Libraries Programme, was a very different time; the network infrastructure was being built, computers were becoming more powerful, and the information society was being formed based on different technological ...
Birte Christensen-Dalsgaard
doaj   +1 more source

SAT and SMT-Based Verification of Security Protocols Including Time Aspects

open access: yesSensors, 2021
For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication.
Sabina Szymoniak   +4 more
doaj   +1 more source

CMT performance optimization algorithm based on union prediction of bandwidth and round trip time

open access: yes工程科学学报, 2015
Concurrent multipath transfer (CMT) uses the stream control transmission protocol's (SCTP) multihoming feature to distribute data across multiple end-to-end paths in a multihomed SCTP association.
LI Wen   +4 more
doaj   +1 more source

Network Adaptive Deadband: NCS Data Flow Control for Shared Networks

open access: yesSensors, 2012
This paper proposes a new middleware solution called Network Adaptive Deadband (NAD) for long time operation of Networked Control Systems (NCS) through the Internet or any shared network based on IP technology.
Miguel Díaz-Cacho   +3 more
doaj   +1 more source

Cost-efficient vaccination protocols for network epidemiology. [PDF]

open access: yesPLoS Computational Biology, 2017
We investigate methods to vaccinate contact networks-i.e. removing nodes in such a way that disease spreading is hindered as much as possible-with respect to their cost-efficiency.
Petter Holme, Nelly Litvak
doaj   +1 more source

Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah

open access: yesSensors, 2017
IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability.
Le Tian   +3 more
doaj   +1 more source

Survey of network-layer anonymous communication protocols

open access: yes网络与信息安全学报, 2020
An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding, content encryption, and traffic obfuscation to hide communication relationships between ...
WANG Liangmin, NI Xiaoling, ZHAO Hui
doaj   +3 more sources

Cross-layer designs for energy efficient wireless body area networks: a review

open access: yesRevista Facultad de Ingeniería Universidad de Antioquia, 2016
Cross-layer design is considered a powerful alternative to solve the complexities of wireless communication in wireless body area networks (WBAN), where the classical communication model has been shown to be inaccurate.
Juan Camilo Correa-Chica   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy