Results 31 to 40 of about 1,289,066 (290)
Layered Quantum Key Distribution [PDF]
We introduce a family of QKD protocols for distributing shared random keys within a network of $n$ users. The advantage of these protocols is that any possible key structure needed within the network, including broadcast keys shared among subsets of ...
Huber, Marcus +2 more
core +2 more sources
Dunng the last ten years, many computer networks have been designed, implemented, and put into service in the United States, Canada, Europe, Japan, and elsewhere. From the experience obtamed with these networks, certain key design principles have begun to emerge, principles that can be used to design new computer networks in a more structured way than ...
openaire +3 more sources
Survey of network-layer anonymous communication protocols
An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding, content encryption, and traffic obfuscation to hide communication relationships between ...
WANG Liangmin, NI Xiaoling, ZHAO Hui
doaj +3 more sources
When several hydroacoustic modems operate simultaneously in an area of mutual coverage, collisions of data packets received from several sources may occur, which lead to information loss.
Konstantin Kebkal +6 more
doaj +1 more source
Cross-layer designs for energy efficient wireless body area networks: a review
Cross-layer design is considered a powerful alternative to solve the complexities of wireless communication in wireless body area networks (WBAN), where the classical communication model has been shown to be inaccurate.
Juan Camilo Correa-Chica +2 more
doaj +1 more source
Improving VANET Protocols via Network Science
Developing routing protocols for Vehicular Ad Hoc Networks (VANETs) is a significant challenge in these large, self- organized and distributed networks. We address this challenge by studying VANETs from a network science perspective to develop solutions ...
Monteiro, Romeu +3 more
core +1 more source
A methodological approach to BISDN signalling performance [PDF]
Sophisticated signalling protocols are required to properly handle the complex multimedia, multiparty services supported by the forthcoming BISDN. The implementation feasibility of these protocols should be evaluated during their design phase, so that ...
Hou, X. +4 more
core +2 more sources
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen +23 more
wiley +1 more source
Equational Reasonings in Wireless Network Gossip Protocols [PDF]
Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout large-scale networks. In this paper, we propose a compositional analysis technique to study formal probabilistic models of gossip protocols ...
Ruggero Lanotte +2 more
doaj +1 more source
Proliferation of Opportunistic Routing: A Systematic Review
Opportunistic networks (OppNet) a new paradigm emerges after the great advancement of wireless technology and MANETs (Mobile Ad-hoc Networks). Store-Carry-forward phenomena is used to route the messages in OppNets; therefore, it is called delay tolerant ...
Renu Dalal +3 more
doaj +1 more source

