نتایج جستجو برای: communication protocol

تعداد نتایج: 569116  

Journal: :CoRR 2017
Julien Richard-Foy Wojciech Pitula

We present endpoints, a library that provides consistent client implementation, server implementation and documentation from a user-defined communication protocol description. The library provides type safe remote invocations, and is modular and extensible. This paper shows how its usage looks like, highlights the Scala features that its implementation relies on, and compares it to other simila...

2008
Qing-yu Cai

We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discus...

2015
Renu Sharma

Today’s modern vehicles contain a complex symbiosis of intelligent electronic systems and integrated mechanical structures. In-vehicle networks provide an efficient method of communication between the various electronic components in an automobile. Invehicle communication contains a very complex structure because safety is a high priority. The communication protocols discussed in this paper are...

2003
Martin Tsenov

The WAN database application of SOAP protocol using XML is considered. Two methods of hierarchical system: two tiers and three tiers models are presented and the communication between client and server depends on XML standard and SOAP protocol are explained.

2004
Leslie D. Fife Le Gruenwald

A MANET is a group of wireless, mobile, battery-powered clients and servers that autonomously form temporary networks. Increasingly, research in MANET data communication has been addressed. Three data communication modes can be provided in a MANET, data broadcast, data query, and peer-to-peer messaging. Currently, no MANET data communication protocol provides the ability to use all MANET data c...

2003
Qing-yu Cai

We present a secure communication protocol which allows direct secure communication. Using quantum nonlocality, information is transferred in a deterministic manner. The security of this protocol is based on the ‘High fidelity implies low entropy’. In fact, the eavesdropper-Eve can use a denial-of-service (DoS) attack to destroy a quantum communication,e.g., she can destroy the travel photon to...

2006
M. Amaç Güvensan Ali Gökhan Yavuz

This paper introduces a new protocol independent security mechanism, called PILSC (Protocol Independent Lightweight Secure Communication). PILSC utilizes the security feature of IPv4, defined but not used yet, in order to have standardization in secure communication. We aim to increase the efficiency of the secure data transfer by means of examining the shortages of different security protocols...

2008
F. Janky J. Horacek T. V. Pereira

The Compass tokamak, reinstalled at IPP Prague, will have a new digital plasma position and shape control system. Development of a communication protocol is necessary for the connection between the energetics devices 1 built by CKD company and the operator either human or computer together. The present work is focused on development of such communication protocol. Human operator can send a requ...

2014
Yuping Zhang Xianghui Feng Yunxiang Guo

CAN bus is ISO international standard serial communication protocol. It is one of the most widely used fieldbus in the world. It has become the standard bus of embedded industrial control LAN. Ethernet is the most common communication protocol standard that is applied in the existing LAN. Networked industrial control usually adopts fieldbus and Ethernet network, thus the protocol conversion pro...

Journal: :JSW 2013
Lixia Xie Yanxin Yan Jiyong Zhang

According to the problem in communication protocol security assessments, a new protocol security comprehensive evaluation method based on the threedimensional sphere model is presented. In this method, a three-dimensional security evaluation index system was built through positions of index on the external of spherical shell. Evaluation index weights of the top two levels were obtained through ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید