Search

Your search keyword '"INTERNET protocols"' showing total 15,218 results

Search Constraints

Start Over You searched for: Descriptor "INTERNET protocols" Remove constraint Descriptor: "INTERNET protocols"
15,218 results on '"INTERNET protocols"'

Search Results

1. Development of wireless and simultaneous seismic data acquisition system (DAQ) with 24-bit resolution using MQTT internet connection.

2. Provably Quantum Secure Three-Party Mutual Authentication and Key Exchange Protocol Based on Modular Learning with Error.

3. Enhancing UAV‐HetNet security through functional encryption framework.

4. GSFedSec: Group Signature-Based Secure Aggregation for Privacy Preservation in Federated Learning.

5. Highly secure authentication and key agreement protocol for the internet of vehicles.

6. Open-Source Internet of Things-Based Supervisory Control and Data Acquisition System for Photovoltaic Monitoring and Control Using HTTP and TCP/IP Protocols.

7. A Reliable Publish–Subscribe Mechanism for Internet of Things-Enabled Smart Greenhouses.

8. Enhancing cybersecurity threat detection and mitigation through IP applied in linux.

9. Analysis of quantum safe wireguard protocol for securing internet of things.

10. Applications of AI and ML techniques for 5G wireless communications.

11. Area efficient high-speed binary divider using Xilinx IP core.

12. Radical infrastructure: Building beyond the failures of past imaginaries for networked communication.

13. An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNNMND) Protocol For Internet of Things.

14. Design of a load balancing Objective Function for RPL.

15. Securing IoT Networks from DDoS Attacks Using a Temporary Dynamic IP Strategy.

16. Privacy-Centric AI and IoT Solutions for Smart Rural Farm Monitoring and Control.

17. Elliptic Curve Cryptography-Based Identity Authentication Scheme Suitable for Metaverse Environment.

18. Efficient Congestion Control Mechanism and Handover Management Scheme for Performance Enhancement of TCP over IoT Network.

19. IoT6-MST: Moving to an IPv6-Based Internet of Things based on Multifarious Sym Teredo (MST) Implemented with Dependent Decision Device (P3D).

20. Analysis of User Behavior using Set-Top-Box for Internet Protocol Television-Based Application.

21. Neighbor discovery protocol anomaly-based detection system using neural network algorithm.

22. Dynamic opportunistic routing protocol for ad-hoc Internet of Vehicles (IoV).

23. Boosting the visibility of services in microservice architecture.

24. WiPoTS: An Application Layer Protocol With Network Protocol Stack Enhancements For Wireless Power Transfer Networks.

25. Treatment Patterns, Acute Healthcare Resource Use, and Costs of Patients with Treatment-Resistant Depression Completing Induction Phase of Esketamine in the United States.

26. Navigating intellectual property (IP): A comparative analysis of Australian universities' IP policies.

27. FogSec: A secure and effective mutual authentication scheme for fog computing.

28. FireDL: A novel framework for fire detection and localization suitable for memory constrained IoT devices.

29. On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks.

30. A Systematic Review Paper on Energy-Efficient Routing Protocols in Internet of Things.

31. MAKA: Multi-Factor Authentication and Key Agreement Scheme for LoRa-Based Smart Grid Communication Services.

32. Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication.

33. A hands‐on guide to use network video recorders, internet protocol cameras, and deep learning models for dynamic monitoring of trout and salmon in small streams.

34. An anonymous mutual authentication and key agreement scheme in WMSN using physiological data.

35. GUI: A Geolocation Method for Unreachable IP.

36. Blockchain-Based Message Authentication Scheme for Internet of Vehicles in an Edge Computing Environment.

37. Modelling and analysis of nuclear reactor system coupled with a liquid metal battery.

38. A review of SDN-enabled routing protocols for Named Data Networking.

39. Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments.

40. A lightweight security and privacy issues and their solution for 6lowpan header for improving the accuracy compared with IP header.

41. Network Simulator-Centric Compositional Testing

42. NordVPN: More than just a VPN, it’s a privacy powerhouse.

43. Internet Protocols Explained: In the second part of this series of articles on internet protocols, we shall delve into the journey from unsecure protocols to secure protocols, with a focus on securing the transport and application layers in the OSI model.

44. Internet Protocols Explained.

45. A Blockchain-Based Secure Sharing Scheme for Electrical Impedance Tomography Data.

46. LG Köln: Mobilfunkvertrag: DSGVO-Verstoß bei fehlender Cookie-Einwilligung und anlassloser Vertragsdatenübermittlung.

47. Formal validation of authentication scheme in 5G-enabled vehicular networks using AVISPA.

48. 3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of Things.

49. CMAP-IoT: Chaotic Map-Based Authentication Protocol for Crowdsourcing Internet of Things.

50. An efficient lightweight authentication scheme for dew‐assisted IoT networks.

Catalog

Books, media, physical & digital resources