Results 31 to 40 of about 1,289,066 (290)

Layered Quantum Key Distribution [PDF]

open access: yes, 2017
We introduce a family of QKD protocols for distributing shared random keys within a network of $n$ users. The advantage of these protocols is that any possible key structure needed within the network, including broadcast keys shared among subsets of ...
Huber, Marcus   +2 more
core   +2 more sources

Network Protocols

open access: yesACM Computing Surveys, 1981
Dunng the last ten years, many computer networks have been designed, implemented, and put into service in the United States, Canada, Europe, Japan, and elsewhere. From the experience obtamed with these networks, certain key design principles have begun to emerge, principles that can be used to design new computer networks in a more structured way than ...
openaire   +3 more sources

Survey of network-layer anonymous communication protocols

open access: yes网络与信息安全学报, 2020
An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding, content encryption, and traffic obfuscation to hide communication relationships between ...
WANG Liangmin, NI Xiaoling, ZHAO Hui
doaj   +3 more sources

Practical Steps towards Establishing an Underwater Acoustic Network in the Context of the Marine Internet of Things

open access: yesApplied Sciences
When several hydroacoustic modems operate simultaneously in an area of mutual coverage, collisions of data packets received from several sources may occur, which lead to information loss.
Konstantin Kebkal   +6 more
doaj   +1 more source

Cross-layer designs for energy efficient wireless body area networks: a review

open access: yesRevista Facultad de Ingeniería Universidad de Antioquia, 2016
Cross-layer design is considered a powerful alternative to solve the complexities of wireless communication in wireless body area networks (WBAN), where the classical communication model has been shown to be inaccurate.
Juan Camilo Correa-Chica   +2 more
doaj   +1 more source

Improving VANET Protocols via Network Science

open access: yes, 2013
Developing routing protocols for Vehicular Ad Hoc Networks (VANETs) is a significant challenge in these large, self- organized and distributed networks. We address this challenge by studying VANETs from a network science perspective to develop solutions ...
Monteiro, Romeu   +3 more
core   +1 more source

A methodological approach to BISDN signalling performance [PDF]

open access: yes, 1994
Sophisticated signalling protocols are required to properly handle the complex multimedia, multiparty services supported by the forthcoming BISDN. The implementation feasibility of these protocols should be evaluated during their design phase, so that ...
Hou, X.   +4 more
core   +2 more sources

European Standard Clinical Practice Guideline and EXPeRT Recommendations for the Diagnosis and Management of Gastroenteropancreatic Neuroendocrine Neoplasms in Children and Adolescents

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen   +23 more
wiley   +1 more source

Equational Reasonings in Wireless Network Gossip Protocols [PDF]

open access: yesLogical Methods in Computer Science, 2018
Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout large-scale networks. In this paper, we propose a compositional analysis technique to study formal probabilistic models of gossip protocols ...
Ruggero Lanotte   +2 more
doaj   +1 more source

Proliferation of Opportunistic Routing: A Systematic Review

open access: yesIEEE Access, 2022
Opportunistic networks (OppNet) a new paradigm emerges after the great advancement of wireless technology and MANETs (Mobile Ad-hoc Networks). Store-Carry-forward phenomena is used to route the messages in OppNets; therefore, it is called delay tolerant ...
Renu Dalal   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy