نتایج جستجو برای: communication protocol
تعداد نتایج: 569116 فیلتر نتایج به سال:
We present endpoints, a library that provides consistent client implementation, server implementation and documentation from a user-defined communication protocol description. The library provides type safe remote invocations, and is modular and extensible. This paper shows how its usage looks like, highlights the Scala features that its implementation relies on, and compares it to other simila...
We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discus...
Today’s modern vehicles contain a complex symbiosis of intelligent electronic systems and integrated mechanical structures. In-vehicle networks provide an efficient method of communication between the various electronic components in an automobile. Invehicle communication contains a very complex structure because safety is a high priority. The communication protocols discussed in this paper are...
The WAN database application of SOAP protocol using XML is considered. Two methods of hierarchical system: two tiers and three tiers models are presented and the communication between client and server depends on XML standard and SOAP protocol are explained.
A MANET is a group of wireless, mobile, battery-powered clients and servers that autonomously form temporary networks. Increasingly, research in MANET data communication has been addressed. Three data communication modes can be provided in a MANET, data broadcast, data query, and peer-to-peer messaging. Currently, no MANET data communication protocol provides the ability to use all MANET data c...
We present a secure communication protocol which allows direct secure communication. Using quantum nonlocality, information is transferred in a deterministic manner. The security of this protocol is based on the ‘High fidelity implies low entropy’. In fact, the eavesdropper-Eve can use a denial-of-service (DoS) attack to destroy a quantum communication,e.g., she can destroy the travel photon to...
This paper introduces a new protocol independent security mechanism, called PILSC (Protocol Independent Lightweight Secure Communication). PILSC utilizes the security feature of IPv4, defined but not used yet, in order to have standardization in secure communication. We aim to increase the efficiency of the secure data transfer by means of examining the shortages of different security protocols...
The Compass tokamak, reinstalled at IPP Prague, will have a new digital plasma position and shape control system. Development of a communication protocol is necessary for the connection between the energetics devices 1 built by CKD company and the operator either human or computer together. The present work is focused on development of such communication protocol. Human operator can send a requ...
CAN bus is ISO international standard serial communication protocol. It is one of the most widely used fieldbus in the world. It has become the standard bus of embedded industrial control LAN. Ethernet is the most common communication protocol standard that is applied in the existing LAN. Networked industrial control usually adopts fieldbus and Ethernet network, thus the protocol conversion pro...
According to the problem in communication protocol security assessments, a new protocol security comprehensive evaluation method based on the threedimensional sphere model is presented. In this method, a three-dimensional security evaluation index system was built through positions of index on the external of spherical shell. Evaluation index weights of the top two levels were obtained through ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید