scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "COMPUTER network protocols"

1 - 10 of 68,168 results for
 "COMPUTER network protocols"
Results per page:

Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 7/12/2022, p1-19. 19p.

Abstract:Security analysis of security protocol can be used to ensure communication security in the network. The process of security protocol analysis using the formal analysis method is simple and standardized, which is a research hotspot in the field of infor...

View details

EACR-LEACH: Energy-Aware Cluster-based Routing Protocol for WSN Based IoT.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 72 Issue 2, p2159-2174. 16p.

Abstract:Internet of Things (IoT) is a recent paradigm to improve human lifestyle. Nowadays, number devices are connected to the Internet drastically. Thus, the people can control and monitor the physical things in real-time without delay. The IoT plays a vital...

View details

Protected Fair Secret Sharing Based Bivariate Asymmetric Polynomials in Satellite Network.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 72 Issue 3, p4789-4802. 14p.

Abstract:Verifiable secret sharing mainly solves the cheating behavior between malicious participants and the ground control center in the satellite network. The verification stage can verify the effectiveness of secret shares issued by the ground control cente...

View details

An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 7/30/2022, p1-18. 18p.

Abstract:RFID (radio frequency identification) is an Internet of Things (IoT) enabling technology. All physical devices can be connected to the Internet of Things thanks to RFID. When RFID is extensively utilized and fast increasing, security and privacy concer...

View details

Prediction of Lung Infection during Palliative Chemotherapy of Lung Cancer Based on Artificial Neural Network.

Publication Type:Academic Journal

Source(s):Computational and mathematical methods in medicine [Comput Math Methods Med] 2022 Jan 10; Vol. 2022, pp. 4312117. Date of Electronic Publication: 2022 Jan 10 (Print Publication: 2022).

Abstract:Lung infection seriously affects the effect of chemotherapy in patients with lung cancer and increases pain. The study is aimed at establishing the prediction model of infection in patients with lung cancer during chemotherapy by an artificial neural n...

View details

IBE-Signal: Reshaping Signal into a MITM-Attack-Resistant Protocol.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 7/21/2022, p1-24. 24p.

Abstract:The Signal Protocol is one of the most popular privacy protocols today for protecting Internet chats and supports end-to-end encryption. Nevertheless, despite its many advantages, the Signal Protocol is not resistant to Man-In-The-Middle (MITM) attacks...

View details

Active Authentication Protocol for IoV Environment with Distributed Servers.

Publication Type:Academic Journal

Source(s):Computers, Materials & Continua. 2022, Vol. 73 Issue 3, p5789-5808. 20p.

Abstract:The Internet of Vehicles (IoV) has evolved as an advancement over the conventional Vehicular Ad-hoc Networks (VANETs) in pursuing a more optimal intelligent transportation system that can provide various intelligent solutions and enable a variety of ap...

View details

Editorial for "MRI-Based Back Propagation Neural Network Model as a Powerful Tool for Predicting the Response to Induction Chemotherapy in Locoregionally Advanced Nasopharyngeal Carcinoma".

Publication Type:Editorial & Opinion

Source(s):Journal of magnetic resonance imaging : JMRI [J Magn Reson Imaging] 2022 Aug; Vol. 56 (2), pp. 560-561. Date of Electronic Publication: 2021 Dec 28.

View details

The Application of Machine Learning Models in Network Protocol Vulnerability Mining.

Publication Type:Academic Journal

Source(s):Security & Communication Networks. 6/24/2022, p1-8. 8p.

Abstract:With the development of society, humans are becoming more and more dependent on the Internet. And there are exploitable vulnerabilities in network sharing protocol vulnerabilities that will cause great risks to individuals and society. Therefore, vulne...

View details

Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel.

Publication Type:Academic Journal

Source(s):Journal of Telecommunications & Information Technology. 2022, Issue 2, p14-25. 12p.

Abstract:It is commonly known that physical layer security is achieved with a trade-off in terms of the achievable rate. Hence, security constraints generate rate losses in wiretap channels. To mitigate such rate losses in multi-user channels, we propose a codi...

View details

banner_970x250 (970x250)

sponsored