نتایج جستجو برای: fixed protocol
تعداد نتایج: 441915 فیلتر نتایج به سال:
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes a new key ex...
Use of mobile devices for data collection in wireless sensor networks (WSNs) has recently drawn much attention. Controlled sink mobility has been shown to be beneficial in energy conservation and lifetime prolongation. In this paper, we aim at studying the multi-hop uneven hierarchical routing protocol (MUHRP) using different mobile sink strategies. We first analyze the performance of multi-hop...
The feedback nature of reliable Internet protocols can be represented by a fixed point algorithm (FPA). The network signals congestion based on the aggregate traffic offered to it and each source adjusts its sending rate based on the feedback from the network to reach the network operating regime. The algorithms of reliable (transport) protocols are based on this fact. The FPA has been one of t...
Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party protocols may not be able to model a group protocol, or its intended security properties. Frequently, such tools require an abstraction to a group of fixed size to be made before the automated analysis takes place. This can preju...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
The Universal 2nd Factor (U2F) protocol is an open authentication standard to strengthen the two-factor authentication process. It augments the existing password based infrastructure by using a specialized USB, termed as the U2F authenticator, as the 2nd factor. The U2F authenticator is assigned two fixed keys at the time of manufacture, namely the device secret key and the attestation private ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید