Results 21 to 30 of about 3,285,429 (341)

Analysis of the DoIP Protocol for Security Vulnerabilities [PDF]

open access: yesComputer Science in Cars Symposium (CSCS 2022), 2022
DoIP, which is defined in ISO 13400, is a transport protocol stack for diagnostic data. Diagnostic data is a potential attack vector at vehicles, so secure transmission must be guaranteed to protect sensitive data and the vehicle. Previous work analyzed a draft version and earlier versions of the DoIP protocol without Transport Layer Security (TLS). No
arxiv   +1 more source

The EPN-TAP protocol for the Planetary Science Virtual Observatory [PDF]

open access: yesAstronomy and Computing, 2014
21 pages. Submitted to Astronomy & Computing, S.I.
Erard, S   +11 more
openaire   +7 more sources

Route Selection for Multi-Hop Cognitive Radio Networks Using Reinforcement Learning: An Experimental Study

open access: yesIEEE Access, 2016
Cognitive radio (CR) enables unlicensed users to explore and exploit underutilized licensed channels (or white spaces). While multi-hop CR network has drawn significant research interest in recent years, majority work has been validated through ...
Aqeel Raza Syed   +5 more
doaj   +1 more source

Quantum Communication [PDF]

open access: yes, 2007
Quantum communication, and indeed quantum information in general, has changed the way we think about quantum physics. In 1984 and 1991, the first protocol for quantum cryptography and the first application of quantum non-locality, respectively, attracted
A Acin   +90 more
core   +2 more sources

Design and implementation of event-based multicast AODV routing protocol for ubiquitous network

open access: yesArray, 2022
We designed and implemented the ECA (Event Condition Action) based Multicast Ad hoc On-demand Distance Vector (ECA-MAODV) routing protocol for the ubiquitous network. The ECA-MADOV protocol plays a predominant role in selecting an efficient route for the
Chandrashekhar Pomu Chavan   +1 more
doaj  

A Cryptographic Moving-Knife Cake-Cutting Protocol [PDF]

open access: yesEPTCS 78, 2012, pp. 15-23, 2012
This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously.
arxiv   +1 more source

Enhancing healthcare at home for older people in rural and regional Australia: A protocol for co-creation to design and implement system change.

open access: yesPLoS ONE, 2023
BackgroundWorld-wide, health service providers are moving towards innovative models of clinical home-based care services as a key strategy to improve equity of access and quality of care.
Cindy Needham   +11 more
doaj   +1 more source

A protocol for retrospective translational science case studies of health interventions [PDF]

open access: yesJournal of Clinical and Translational Science, 2020
Abstract The critical processes driving successful research translation remain understudied. We describe a mixed-method case study protocol for analyzing translational research that has led to the successful development and implementation of innovative health interventions.
Sara E. Dodson   +4 more
openaire   +3 more sources

An efficient one-step site-directed deletion, insertion, single and multiple-site plasmid mutagenesis protocol [PDF]

open access: yes, 2012
Background: Mutagenesis plays an essential role in molecular biology and biochemistry. It has also been used in enzymology and protein science to generate proteins which are more tractable for biophysical techniques.
Liu, Huanting, Naismith, James Henderson
core   +1 more source

Diplomatic protocol as a tool of international economic relations [PDF]

open access: yesBaltic Region, 2011
Both the official (state and diplomatic) and business protocols are frequently used in Europe; in Russia, it has become a focus of attention in recent years. Thus, there arises a need of training specialists in protocol. However, this aspect has not been
Pshtyka Vadim
doaj   +1 more source

Home - About - Disclaimer - Privacy