نتایج جستجو برای: flexible protocol

تعداد نتایج: 360970  

2016
Kyu Byung Lee Jong Rok Kim Goon Cherl Park Hyoung Kyu Cho

Liquid film thickness measurements under temperature-varying conditions in a two-phase flow are of great importance to refining our understanding of two-phase flows. In order to overcome the limitations of the conventional electrical means of measuring the thickness of a liquid film, this study proposes a three-electrode conductance method, with the device fabricated on a flexible printed circu...

2004
Quan Bai Minjie Zhang

In a multi-agent system (MAS), agent interactions are established through exchanging messages following interaction protocols. Most current agent interaction protocols are hard-coded within agents during the agent designing, and this feature greatly reduces the flexibility of the agent interactions. In this paper, we present a Colored Petri Nets (CPNs) based approach to form flexible interactio...

Journal: :RFC 2014
Thomas Haynes

This memo outlines high-level requirements for the integration of flexible Mandatory Access Control (MAC) functionality into the Network File System (NFS) version 4.2 (NFSv4.2). It describes the level of protections that should be provided over protocol components and the basic structure of the proposed system. The intent here is not to present the protocol changes but to describe the environme...

Journal: :RFC 2007
Nancy Cam-Winget David A. McGrew Joseph Salowey Hao Zhou

This document defines the Extensible Authentication Protocol (EAP) based Flexible Authentication via Secure Tunneling (EAP-FAST) protocol. EAP-FAST is an EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) to establish a mutually authenticated tunnel. Within the tunnel, Type-Length-Value (TLV) objects are used to convey authentica...

2014
Nandana Mihindukulasooriya Miguel Esteban Gutiérrez Raúl García-Castro

The W3C Linked Data Platform (LDP) specification defines a standard HTTP-based protocol for read/write Linked Data and provides the basis for application integration using Linked Data. This paper presents an LDP adapter for the Bugzilla issue tracker and demonstrates how to use the LDP protocol to expose a traditional application as a read/write Linked Data application. This approach provides a...

2016
Cory Sabol William Nick Maya Earl Joseph Shelton Albert C. Esterline

The WebID protocol solves the challenge of remembering usernames and passwords. We enhance this protocol in three ways. First, we give it the ability to manage groups of agents and control their access to resources on the Web. Second, we add support for biometric access control to enhance security. Finally, we add support for OWL-based policies that may be federated and result in flexible acces...

2004
Anand Dersingh Ramiro Liscano Allan G. Jost Hao Hu

Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP provides a flexible and scalable service discovery framework over IP networks. This paper presents an approach for service discovery and access control under session-based peer-to-peer communications. In other words, it is an approach providing mechanisms for restricting unauthorized discovery or acce...

2004
Helger Lipmaa

We propose a one-round 1-out-of-n computationally-private information retrieval protocol for `-bit strings with low-degree polylogarithmic receivercomputation, linear sender-computation and communication Θ(k · log n + ` · log n), where k is a possibly non-constant security parameter. The new protocol is receiver-private if the underlying length-flexible additively homomorphic public-key cryptos...

Journal: :J. Embedded Computing 2009
Mimoza Durresi Vamsi Paruchuri Arjan Durresi Leonard Barolli Makoto Takizawa

Ensuring anonymity in wireless and hoc networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel Scalable Anonymous Protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping adversar...

2005
Arjan Durresi Vamsi Paruchuri Mimoza Durresi Leonard Barolli

Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel hierarchical anonymous communication protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید