Search results
Jump to navigation
Jump to search
- ...man–Stubblebine protocol''' is a [[computer network]] [[authentication]] [[communications protocol|protocol]] designed for use on [[insecure network]]s (e.g., the [[ ==Subsequent communications== ...4 KB (629 words) - 04:08, 6 May 2023
- ...t2=Shpilrain|first2=Vladimir|year=2014|title=Tropical Cryptography|journal=Communications in Algebra|volume=42|issue=6|pages=2624–2632|arxiv=1301.1195|doi=10.1080/00 ...2 KB (230 words) - 01:41, 2 July 2024
- *IEC 61334-4-1:1996 Data communication protocols – Reference model of the communication system *IEC 61334-4-32:1996 Data communication protocols – Section 32: Data link layer – Logical link control (LLC) ...7 KB (1,079 words) - 21:46, 16 August 2021
- ...chmann| first1 = G.v. | title = Finite State Description of Communication Protocols, Computer Networks, Vol. 2 (1978), pp. 361-372 }}</ref> This paper was insp ...ould also deal with the possibility of out-of-order delivery. Higher-level protocols normally use a session-oriented Transport service which means that the medi ...12 KB (1,837 words) - 05:48, 14 February 2022
- ...A. |title=Quantum state merging and negative information|year=2007|journal=Communications in Mathematical Physics|volume=269|issue=1 |pages=107–136|bibcode=2007CMaPh |title=The mother of all protocols: restructuring quantum information's family tree|journal=Proc. R. Soc. A | ...3 KB (424 words) - 16:42, 12 May 2022
- ...FIP-TC6 International Conference on Networking Technologies, Services, and Protocols, Performance ofo Computer and Communication Networks, Mobile and Wireless C ....edu/research/pdf/12-03.pdf An Evolution of Computer Science Research]", ''Communications of the ACM'', 56(10):79 </ref> ...3 KB (492 words) - 05:03, 9 September 2024
- ...ital Video Broadcasting|DVB]]. GSE provides means to carry packet oriented protocols such as [[Internet Protocol|IP]] on top of uni-directional [[physical layer The [[Communications protocol|protocol]] [[specification]] has been published as [[ETSI]] TS ...12 KB (1,692 words) - 15:36, 13 August 2024
- ...pping|coin tossing]], which were also the first relativistic cryptographic protocols.<ref name="Kent99commitment"/><ref name="Kent99cointossing"/> He is a co-in ...ary representations of the Virasoro and super-Virasoro algebras |journal=[[Communications in Mathematical Physics]] |first1=Peter |last1=Goddard |authorlink1=Peter G ...14 KB (1,607 words) - 06:33, 4 April 2024
- ...ive]] which can be used to construct more complex and useful cryptographic protocols,<ref>{{Cite book |last=Oded. |first=Goldreich |title=Foundations of cryptog ...rimental quantum coin flipping cryptography performs better than classical protocols"], ''Phys.org'', March 26, 2014</ref> Consequently, both users (or players) ...24 KB (3,731 words) - 05:26, 7 November 2024
- ...hy is a sub-field of relativistic cryptography, in which [[cryptographic]] protocols exploit the no-superluminal signalling principle, independently of whether ...Kent99cointossing"/> Since then, other unconditionally secure relativistic protocols for bit commitment have been found by Kent and others,<ref name="Kent05comm ...25 KB (3,199 words) - 11:31, 12 December 2023
- ...over a potentially insecure network<ref name=":0" />. In particular, these protocols can identify any possible attempts to modify either the [[Man-in-the-middle ...third parties in order to change their behaviour and compromise any secure communications. Furthermore, the devices may be designed so as to mimic the behaviour of a ...31 KB (4,492 words) - 08:03, 30 January 2025
- ...gazine=Wired|access-date=2020-04-18|language=en|issn=1059-1028}}</ref> The protocols differ in their reporting mechanism, with PEPP-PT requiring clients to uplo ...contact log of any client in the network. This is in contrast to competing protocols like PEPP-PT, where the central reporting server receives and processes cli ...23 KB (3,262 words) - 08:15, 8 January 2025
- ...s of the cluster—major critical systems also include non-[[IP address|IP]] protocols like [[serial port]]s to deliver heartbeats.{{sfn|Robertson|2000|p=5}} In this [[communications protocol]] every node sends back a message in a given interval, say [[Delta ...10 KB (1,502 words) - 00:21, 17 October 2024
- ...otocol designed for traffic safety applications. As other computer network protocols, it is also subject to several attacks that can have fatal consequences due ...can be found in VANET standards.<ref>SAE Standards. Dedicated Short Range Communications (DSRC) Message Set Dictionary. WIP Standard J2735, November 2009.</ref><ref ...14 KB (2,173 words) - 20:35, 20 February 2025
- '''Proof-of-stake''' ('''PoS''') protocols are a class of [[Consensus (computer science)|consensus mechanisms]] for [[ ...]]);{{sfn|Deirmentzoglou|Papakyriakopoulos|Patsakis|2019|p=28714}} in most protocols, the validators receive a reward for doing so.<ref name="Saleh">{{Cite jour ...22 KB (2,839 words) - 19:05, 16 January 2025
- | title = Cryptography and Cryptographic Protocols | chapter = The round complexity of secure protocols ...21 KB (3,076 words) - 09:45, 7 February 2025
- ...Part 20: Crypto suite Algebraic Eraser security services for air interface communications. Working Draft.</ref> a standard for securing [[radio-frequency identificat [[Category:Key-agreement protocols]] ...11 KB (1,668 words) - 00:27, 19 October 2022
- ...iew">Asthana, R.; Singh, Y.N.; Grover, W.D.; "p-Cycles: An overview," IEEE Communications Surveys and Tutorials, vol.12, no.1, pp.97-111, First Quarter 2010</ref><re ...euristic method for design of survivable WDM networks with p-cycles," IEEE Communications Letters, vol.8, no.7, pp. 467- 469, July 2004</ref> The ''[[Heuristic]]'' m ...19 KB (3,022 words) - 07:39, 30 December 2024
- ...identification: transaction systems to make big brother obsolete | journal=Communications of the ACM | volume=28 | issue=10 | year=1985 | pages=1030–1044 | doi=10.11 ...countable Group Anonymity | conference=17th ACM Conference on Computer and Communications Security (CCS) | date=October 2010 | location=Chicago, IL, USA | url=http:/ ...16 KB (2,357 words) - 18:15, 8 May 2024
- .... Weber. A primer on spatial modeling and analysis in wireless networks. ''Communications Magazine, IEEE'', 48(11):156–163, 2010.</ref><ref name="Haenggi2009">M. Hae ...an model to the Poisson–Voronoi tessellation with applications to wireless communications. ''Advances in Applied Probability'', 33(2):293–323, 2001.</ref> as the col ...59 KB (8,607 words) - 07:51, 16 February 2025