Zobrazeno 1 - 10
of 1 295
pro vyhledávání: '"IP tunnel"'
Autor:
Janibul Bashira, Ishfaq Hussaina
Publikováno v:
Journal of King Saud University - Computer and Information Sciences. 34:7070-7088
With an increase in the number of internet users and the need to secure internet traffic, the IPv4 protocol has been replaced by a more secure protocol, namely IPv6. The IPv6 protocol does not allow intermediate routers to fragment the on-going packe
Autor:
Abdullatif Y. M. Alhatem
Publikováno v:
INDIAN JOURNAL OF APPLIED RESEARCH. :47-50
At the present time the smart technology enhanced to be utilized for the human life in many elds, especially in the houses. The building automation experienced a rapid growth in techniques and methods to provide an advanced management for operatio
Autor:
Jörg Schwenk
Publikováno v:
Guide to Internet Cryptography ISBN: 9783031194382
Sicherheit und Kryptographie im Internet ISBN: 9783528031800
Sicherheit und Kryptographie im Internet ISBN: 9783834808141
Sicherheit und Kryptographie im Internet ISBN: 9783834800428
Sicherheit und Kryptographie im Internet ISBN: 9783528031800
Sicherheit und Kryptographie im Internet ISBN: 9783834808141
Sicherheit und Kryptographie im Internet ISBN: 9783834800428
Das Internet Protocol (IP) hat in den letzten Jahren alle anderen Netzwerkprotokolle weitgehend verdrangt. Die Grunde fur diesen verdienten Erfolg sind vielfaltig und reichen von der sauberen Aufgabenteilung zwischen IP und TCP (Transport Control Pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::982344ed3637fc9b676fd713dfaae8f3
https://doi.org/10.1007/978-3-031-19439-9_8
https://doi.org/10.1007/978-3-031-19439-9_8
Publikováno v:
IEEE Access, Vol 7, Pp 141438-141455 (2019)
With the rapid development of edge computing technology, the scale of the network continues to expand. Various types of applications are becoming more widespread. In the edge computing, existing network agents, NAT, IP tunneling technologies, and rap
Publikováno v:
ICCCNT
With increase in the operation of remote servers there is a need to efficiently facilitate the distant availability and operation of applications in IoT. These applications could be used in workplace, education as well as in time-critical systems to
Autor:
Masato Tsuru, Nguyen Viet Ha
Publikováno v:
Advances in Intelligent Networking and Collaborative Systems ISBN: 9783319985565
INCoS
INCoS
Transmission Control Protocol (TCP) with a loss-based congestion control is still dominantly used for reliable end-to-end data transfer over diverse types of network although it is ineffective when traversing lossy networks. We previously proposed an
Publikováno v:
Electronics
Volume 10
Issue 15
e-Archivo. Repositorio Institucional de la Universidad Carlos III de Madrid
instname
Electronics, Vol 10, Iss 1868, p 1868 (2021)
Volume 10
Issue 15
e-Archivo. Repositorio Institucional de la Universidad Carlos III de Madrid
instname
Electronics, Vol 10, Iss 1868, p 1868 (2021)
Network Functions Virtualization (NFV) is a key technology for network automation and has been instrumental to materialize the disruptive view of 5G and beyond mobile networks. In particular, 5G embraces NFV to support the automated and agile provisi
Autor:
Maryline Laurent, Tobias Guggemos, Sylvain Killian, Daniel Migault, Guy Pujolle, Jean Philippe Wary
Publikováno v:
Journal of Computer Security
Journal of Computer Security, 2017, 25 (2), pp.173-203. ⟨10.3233/JCS-16857⟩
Journal of Computer Security, IOS Press, 2017, 25 (2), pp.173-203. ⟨10.3233/JCS-16857⟩
Journal of Computer Security, 2017, 25 (2), pp.173-203. ⟨10.3233/JCS-16857⟩
Journal of Computer Security, IOS Press, 2017, 25 (2), pp.173-203. ⟨10.3233/JCS-16857⟩
International audience; The number of devices connected through the Internet of Things (IoT) will significantly grow in the next few years while security of their interconnections is going to be a major challenge. For many devices in IoT scenarios, t
Publikováno v:
Journal of Cyber Security Technology. 1:108-126
Network traffic classification and characterisation is playing an increasingly vital role in understanding and solving security-related issues in internet-based applications. The priority of resear...
Publikováno v:
Wireless Personal Communications. 95:3509-3537
Packet filtering allows a network gateway to control the network traffic flows and protect the computer system. Most of the recent research works on the filtering systems mainly concern the performance, reliability and defence against common network