Search

Your search keyword '"COMPUTER network protocols"' showing total 211 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Publisher springer nature Remove constraint Publisher: springer nature
211 results on '"COMPUTER network protocols"'

Search Results

1. An empirical study of reflection attacks using NetFlow data.

2. Analysis and Performance Comparison of IoT Message Transfer Protocols Applying in Real Photovoltaic System.

3. Correlation-based advanced feature analysis for wireless sensor networks.

4. Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario.

5. UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks.

6. MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference.

7. Discovering golden ratio in the world's first five-agent network in ancient China.

8. Privacy-preserving routing using jointly established protocol in IoT network environment.

9. A Q-learning-based distributed queuing Mac protocol for Internet-of-Things networks.

10. An adaptive centralized authentication control method to reduce association delay in the IoT 802.11ah protocol.

11. NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices.

12. Trusted consensus protocol for blockchain networks based on fuzzy inference system.

13. A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway.

14. Congestion aware low power on chip protocols with network on chip with cloud security.

15. Entanglement generation in a quantum network at distance-independent rate.

16. Independent spanning trees on WK-recursive networks and WK-recursive pyramids.

17. Chain and silk: alternative futures of blockchain governance in Kyrgyzstan.

18. Benchmarking of quantum protocols.

19. Quantum-enabled operation of a microwave-optical interface.

20. Performance evaluation and comparison study of adaptive MANET service location and discovery protocols for highly dynamic environments.

21. ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies.

22. A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT).

23. Formalising Σ-Protocols and Commitment Schemes Using CryptHOL.

24. An efficient simulation for quantum secure multiparty computation.

25. Distributed data hiding in multi-cloud storage environment.

26. Time-critical energy minimization protocol using PQM (TCEM-PQM) for wireless body sensor network.

27. Enhanced lifetime of heterogeneous wireless sensor network using stable election protocol with region-based energy-conscious sink movement.

28. Area double cluster head APTEEN routing protocol-based particle swarm optimization for wireless sensor networks.

29. Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks.

30. An improved content-based outlier detection method for ICS intrusion detection.

31. Big Data Processing using Internet of Software Defined Things in Smart Cities.

32. Parameterized synthesis of self-stabilizing protocols in symmetric networks.

33. Blocking and Other Enhancements for Bottom-Up Model Generation Methods.

34. The energy-efficient MDA-SMAC protocol for wireless sensor networks.

35. CDABC: chaotic discrete artificial bee colony algorithm for multi-level clustering in large-scale WSNs.

36. Multi-level clustering protocol for load-balanced and scalable clustering in large-scale wireless sensor networks.

37. Light-traffic analysis of random access systems without collisions.

38. Improved user-private information retrieval via finite geometry.

39. MOSAIC: A Scalable Coherence Protocol.

40. Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO).

41. Field classification-based novel fuzzing case generation for ICS protocols.

42. A secure ECC-based RFID mutual authentication protocol for internet of things.

43. The intelligent IoT common service platform architecture and service implementation.

44. Wireless protocol validation under uncertainty.

45. Introduction to the special issue on runtime verification.

46. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

47. Self-adaptive risk-aware routing in opportunistic network.

48. Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag.

49. A secure and efficient payment protocol based on ElGamal cryptographic algorithms.

50. Design of electronic payment system based on authenticated key exchange.

Catalog

Books, media, physical & digital resources