Zobrazeno 1 - 10
of 467
pro vyhledávání: '"General Inter-ORB Protocol"'
Publikováno v:
International Journal of Computer Applications. 168:29-34
Publikováno v:
IEEE Internet of Things Journal. 3:544-553
In this paper, we propose a secure object tracking protocol to ensure the visibility and traceability of an object along the travel path to support the Internet of Things (IoT). The proposed protocol is based on radio frequency identification system
Autor:
Liuhong Yan, Liang Jia
Publikováno v:
International Journal of Future Generation Communication and Networking. 9:197-204
S3 Computing requires distributed computing performed by social network platform has high scalability and security. Protocol models meeting the requirements of S3 Computing not only ensure the correctness and robustness of distributed computing, but
Publikováno v:
ACM Computing Surveys. 48:1-26
Computer network protocols define the rules in which two entities communicate over a network of unique hosts. Many protocol specifications are unknown, unavailable, or minimally documented, which prevents thorough analysis of the protocol for securit
Publikováno v:
Information Sciences. 321:224-237
Secure group communication over an untrusted open network is a continuing problem, especially in mobile environments. With the development of 3G networks and mobile computing technology, the number of group-oriented applications is increasing rapidly
Publikováno v:
Journal of Computer Security. 23:259-307
Many security protocols are built as the composition of an application-layer protocol and a secure transport protocol, such as TLS. There are several approaches to proving the correctness of such protocols. One popular approach is verification by abs
Publikováno v:
Indian Journal of Science and Technology. 8:1-5
Background/Objectives: Cryptographic protocols are used for securing information when transmitting it over insecure network such as Internet. This paper’s objective is to study recently proposed key exchange protocols for mobile environment. Method
Autor:
Yi Ying Yin, Cheng Yuan Yu
Publikováno v:
Applied Mechanics and Materials. :665-668
In pervasive computing environments, a single service is often unable to meet the complex needs of users. A composite service is a combination of services to provide value-added services that a single service cannot achieve. Thus, it is important to
Autor:
Mostafa Hashem Sherif
Publikováno v:
Protocols for Secure Electronic Commerce ISBN: 9781315373973
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::53f726cf33df752a47592108f92aee00
https://doi.org/10.1201/b20160-8
https://doi.org/10.1201/b20160-8
Publikováno v:
APNOMS
A network protocol defines rules that control communications between two or more hosts on the Internet, whereas Protocol Reverse Engineering (PRE) defines the process of extracting the structure, attributes and data from a network protocol. Enough kn