Works matching DE "COMPUTER network protocols"
Results: 4594
Performance Evaluation and Selection of Appropriate Congestion Control Algorithms for MPT Networks.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 2, p. 109, doi. 10.14569/ijacsa.2025.0160211
- By:
- Publication type:
- Article
Lightweight Authentication Protocol for Smart Grids: An Energy-Efficient Authentication Scheme for Resource-Limited Smart Meters.
- Published in:
- Mathematics (2227-7390), 2025, v. 13, n. 4, p. 580, doi. 10.3390/math13040580
- By:
- Publication type:
- Article
Will Bitcoin Incarnate Satoshi Nakamoto's Vision of Depoliticized Money?
- Published in:
- Journal of Economic Issues, 2025, v. 59, n. 1, p. 207, doi. 10.1080/00213624.2025.2455659
- By:
- Publication type:
- Article
Ethernet Passive Mutual Authentication Scheme on Quantum Networks.
- Published in:
- Entropy, 2025, v. 27, n. 2, p. 135, doi. 10.3390/e27020135
- By:
- Publication type:
- Article
Enhancing Clustering Efficiency in Heterogeneous Wireless Sensor Network Protocols Using the K-Nearest Neighbours Algorithm.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 1029, doi. 10.3390/s25041029
- By:
- Publication type:
- Article
Representing Conversations for Scalable Overhearing.
- Published in:
- Journal of Artificial Intelligence Research, 2006, v. 25, p. 349, doi. 10.1613/jair.1829
- By:
- Publication type:
- Article
COMPUTER PROGRAMMING AND THE LAW: A NEW RESEARCH AGENDA.
- Published in:
- Villanova Law Review, 2009, v. 54, n. 1, p. 117
- By:
- Publication type:
- Article
LEVERAGING IP FOR BUSINESS SUCCESS.
- Published in:
- International Journal of Information Technology & Decision Making, 2003, v. 2, n. 4, p. 641, doi. 10.1142/S0219622003000884
- By:
- Publication type:
- Article
Global Convergence in Partially Fully Connected Networks (PFCN) with Limited Relays.
- Published in:
- International Journal of Information Technology & Decision Making, 2003, v. 2, n. 2, p. 265, doi. 10.1142/S021962200300063X
- By:
- Publication type:
- Article
Making the Mobile Internet Secure.
- Published in:
- Innovation, 2004, v. 4, n. 1, p. 48
- By:
- Publication type:
- Article
Guest editorial to the special section on ECMFA and ICMT at STAF 2016.
- Published in:
- 2019
- By:
- Publication type:
- Editorial
Stress-testing remote model querying APIs for relational and graph-based stores.
- Published in:
- Software & Systems Modeling, 2019, v. 18, n. 2, p. 1047, doi. 10.1007/s10270-017-0606-9
- By:
- Publication type:
- Article
Constructing and verifying a robust Mix Net using CSP.
- Published in:
- Software & Systems Modeling, 2016, v. 15, n. 4, p. 1063, doi. 10.1007/s10270-015-0474-0
- By:
- Publication type:
- Article
Biopolymer‐Polysiloxane Double Network Aerogels.
- Published in:
- Angewandte Chemie, 2023, v. 135, n. 41, p. 1, doi. 10.1002/ange.202306518
- By:
- Publication type:
- Article
A comprehensive survey of localization schemes and routing protocols with fault tolerant mechanism in UWSN- Recent progress and future prospects.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 31, p. 76449, doi. 10.1007/s11042-024-18525-0
- By:
- Publication type:
- Article
Internet of vehicles: concept, process, security aspects and solutions.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 12, p. 16563, doi. 10.1007/s11042-022-12386-1
- By:
- Publication type:
- Article
Unconditionally Secure Credit/Debit Card Chip Scheme and Physical Unclonable Function.
- Published in:
- Fluctuation & Noise Letters, 2017, v. 16, n. 1, p. -1, doi. 10.1142/S021947751750002X
- By:
- Publication type:
- Article
Securing Vehicle Communication Systems by the KLJN Key Exchange Protocol.
- Published in:
- Fluctuation & Noise Letters, 2014, v. 13, n. 3, p. -1, doi. 10.1142/S0219477514500205
- By:
- Publication type:
- Article
Protocols and techniques for a scalable atom–photon quantum network.
- Published in:
- Fortschritte der Physik / Progress of Physics, 2009, v. 57, n. 11/12, p. 1133
- By:
- Publication type:
- Article
Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 377, doi. 10.1049/ntw2.12136
- By:
- Publication type:
- Article
Cross layer protocol architecture for spectrum‐based routing in cognitive radio networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 1, p. 58, doi. 10.1049/ntw2.12101
- By:
- Publication type:
- Article
Data security in smart devices: Advancement, constraints and future recommendations.
- Published in:
- IET Networks (Wiley-Blackwell), 2023, v. 12, n. 6, p. 269, doi. 10.1049/ntw2.12091
- By:
- Publication type:
- Article
Innovative mutual information‐based weighting scheme in stateless opportunistic networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2021, v. 10, n. 4, p. 162, doi. 10.1049/ntw2.12008
- By:
- Publication type:
- Article
Online piracy, anonymity and social change: Innovation through deviance.
- Published in:
- Convergence: The Journal of Research into New Media Technologies, 2013, v. 19, n. 1, p. 95, doi. 10.1177/1354856512456789
- By:
- Publication type:
- Article
The once and future internet: infrastructural tragedy and ambiguity in the case of IPv6.
- Published in:
- Internet Histories, 2018, v. 2, n. 1/2, p. 55, doi. 10.1080/24701475.2018.1455311
- By:
- Publication type:
- Article
Formally analyzed m-coupon protocol with confirmation code (MCWCC).
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2019, v. 27, n. 1, p. 484, doi. 10.3906/elk-1712-288
- By:
- Publication type:
- Article
A secure cross-layer AODV routing method to detect and isolate (SCLARDI) black hole attacks for MANET.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 4, p. 2761, doi. 10.3906/elk-1508-121
- By:
- Publication type:
- Article
ERP: An efficient reactive routing protocol for dense vehicular ad hoc networks.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 3, p. 1762, doi. 10.3906/elk-1507-147
- By:
- Publication type:
- Article
Implementation of a personal area network for secure routing in MANETs by using low-cost hardware.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 1, p. 235, doi. 10.3906/elk-1501-112
- By:
- Publication type:
- Article
Comparison of group key establishment protocols.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 1, p. 46, doi. 10.3906/elk-1407-213
- By:
- Publication type:
- Article
Preserving location privacy for a group of users.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2013, v. 21, n. 1, p. 1857, doi. 10.3906/elk-1109-8
- By:
- Publication type:
- Article
An event-driven WSN MAC protocol design based on active node and dynamic time slot allocation.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2013, v. 21, n. 3, p. 812, doi. 10.3906/elk-1108-14
- By:
- Publication type:
- Article
Packet traffic features of IPv6 and IPv4 protocol traffic.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2012, v. 20, n. 5, p. 727, doi. 10.3906/elk-1008-696
- By:
- Publication type:
- Article
Design, implementation, and performance analysis of the WorldFIP/ATM local bridge.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2012, v. 20, n. 3, p. 425, doi. 10.3906/elk-1010-879
- By:
- Publication type:
- Article
Tradeoff tables for compression functions: how to invert hash values.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2012, v. 20, n. 1, p. 57, doi. 10.3906/elk-1003-412
- By:
- Publication type:
- Article
A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2010, v. 18, n. 1, p. 1, doi. 10.3906/elk-0904-6
- By:
- Publication type:
- Article
Network Traffic Properties of Bimodal Multicast Protocol.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2003, v. 11, n. 1, p. 17
- By:
- Publication type:
- Article
Sistem Penjadwalan Pemberian Pakan Ikan pada Akuarium Pintar Berbasis Network Time Protocol.
- Published in:
- Techno.com, 2022, v. 21, n. 3, p. 487, doi. 10.33633/tc.v21i3.6133
- By:
- Publication type:
- Article
Energy-Efficient Routing in Wireless Sensor Networks.
- Published in:
- Acta Cybernetica, 2021, v. 25, n. 2, p. 421, doi. 10.14232/actacyb.288351
- By:
- Publication type:
- Article
The dynamics of circulating SARS-CoV-2 lineages in Bogor and surrounding areas reflect variant shifting during the first and second waves of COVID-19 in Indonesia.
- Published in:
- PeerJ, 2022, p. 1, doi. 10.7717/peerj.13132
- By:
- Publication type:
- Article
Biometric Electronic Signatures.
- Published in:
- ISSA Journal, 2017, v. 15, n. 11, p. 28
- By:
- Publication type:
- Article
Cryptographic Architectures: MISSING IN ACTION.
- Published in:
- ISSA Journal, 2017, v. 15, n. 7, p. 16
- By:
- Publication type:
- Article
Experiences with the Bettman-Park Verbal-Protocol Coding Scheme.
- Published in:
- Journal of Consumer Research, 1982, v. 8, n. 4, p. 442, doi. 10.1086/208884
- By:
- Publication type:
- Article
Protest Records, Data Validity, and the Mexican Media: Development and Assessment of a Keyword Search Protocol.
- Published in:
- Social Movement Studies, 2010, v. 9, n. 1, p. 69, doi. 10.1080/14742830903442535
- By:
- Publication type:
- Article
NETWORK SECURITY: CHALLENGES AND SOLUTIONS.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 112
- By:
- Publication type:
- Article
https://everywhere! ENCRYPTING THE INTERNET.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 66
- By:
- Publication type:
- Article
Integration Challenges and Tradeoffs for Tera-scale Architectures.
- Published in:
- Intel Technology Journal, 2007, v. 11, n. 3, p. 1, doi. 10.1535/itj.1103.01
- By:
- Publication type:
- Article
Session Initiation Protocol (SIP) Evolution in Converged Communications.
- Published in:
- Intel Technology Journal, 2006, v. 10, n. 1, p. 11, doi. 10.1535/itj.1001.02
- By:
- Publication type:
- Article
Scalable Intel® IXA and its Building Blocks for Networking Platforms.
- Published in:
- Intel Technology Journal, 2003, v. 7, n. 4, p. 107
- By:
- Publication type:
- Article
Distributed Control Plane Architecture for Network Elements.
- Published in:
- Intel Technology Journal, 2003, v. 7, n. 4, p. 51
- By:
- Publication type:
- Article