Gotowa bibliografia na temat „Reuse and protocol exchange”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Reuse and protocol exchange”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Reuse and protocol exchange"

1

Aydin, Muhammed Iberia, Damla Ozaktac, Burak Yuzer, Mustafa Doğu, Hatice Inan, Hatice Eser Okten, Serdar Coskun i Huseyin Selcuk. "Desalination and Detoxification of Textile Wastewater by Novel Photocatalytic Electrolysis Membrane Reactor for Ecosafe Hydroponic Farming". Membranes 12, nr 1 (23.12.2021): 10. http://dx.doi.org/10.3390/membranes12010010.

Pełny tekst źródła
Streszczenie:
In this study, a novel photoelectrocatalytic membrane (PECM) reactor was tested as an option for the desalination, disinfection, and detoxification of biologically treated textile wastewater (BTTWW), with the aim to reuse it in hydroponic farming. The anionic ion exchange (IEX) process was used before PECM treatment to remove toxic residual dyes. The toxicity evaluation for every effluent was carried out using the Vibrio fischeri, Microtox® test protocol. The disinfection effect of the PECM reactor was studied against E. coli. After PECM treatment, the 78.7% toxicity level of the BTTWW was reduced to 14.6%. However, photocatalytic desalination during treatment was found to be slow (2.5 mg L−1 min−1 at 1 V potential). The reactor demonstrated approximately 52% COD and 63% TOC removal efficiency. The effects of wastewater reuse on hydroponic production were comparatively investigated by following the growth of the lettuce plant. A detrimental effect was observed on the lettuce plant by the reuse of BTTWW, while no negative impact was reported using the PECM treated textile wastewater. In addition, all macro/micronutrient elements in the PECM treated textile wastewater were recovered by hydroponic farming, and the PECM treatment may be an eco-safe wastewater reuse method for crop irrigation.
Style APA, Harvard, Vancouver, ISO itp.
2

Termens, Miquel, Mireia Ribera i Anita Locher. "An analysis of file format control in institutional repositories". Library Hi Tech 33, nr 2 (15.06.2015): 162–74. http://dx.doi.org/10.1108/lht-10-2014-0098.

Pełny tekst źródła
Streszczenie:
Purpose – The purpose of this paper is to analyze the file formats of the digital objects stored in two of the largest open-access repositories in Spain, DDUB and TDX, and determines the implications of these formats for long-term preservation, focussing in particular on the different versions of PDF. Design/methodology/approach – To be able to study the two repositories, the authors harvested all the files corresponding to every digital object and some of their associated metadata using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) and Open Archives Initiative Object Reuse and Exchange (OAI-ORE) protocols. The file formats were analyzed with DROID software and some additional tools. Findings – The results show that there is no alignment between the preservation policies declared by institutions, the technical tools available, and the actual stored files. Originality/value – The results show that file controls currently applied to institutional repositories do not suffice to grant their stated mission of long-term preservation of scientific literature.
Style APA, Harvard, Vancouver, ISO itp.
3

STINE, JOHN A., GUSTAVO DE VECIANA, KEVIN H. GRACE i ROBERT C. DURST. "ORCHESTRATING SPATIAL REUSE IN WIRELESS AD HOC NETWORKS USING SYNCHRONOUS COLLISION RESOLUTION (SCR)". Journal of Interconnection Networks 03, nr 03n04 (wrzesień 2002): 167–95. http://dx.doi.org/10.1142/s0219265902000616.

Pełny tekst źródła
Streszczenie:
We propose a novel medium access control protocol for ad hoc wireless networks data to send can contend simultaneously for the channel. Nodes contend for access using a synchronous signaling mechanism that achieves two objectives: it arbitrates contentions locally and it selects a subset of nodes across the network that attempt to transmit simultaneously. The subset of nodes that survive the signaling mechanism can be viewed as an orchestrated set of transmissions that are spatially reusing the channel shared by the nodes. Thus the 'quality' of the subset of nodes selected by the signaling mechanism is a key factor in determining the spatial capacity of the system. In this paper, we propose a general model for such synchronous signaling mechanisms and recommend a preferred design. We then focus via both analysis and simulation on the spatial and capacity characteristics of these access control mechanisms. Our work is unique in that it specifically focuses on the spatial capacity aspects of a MAC protocol, as would be critical for ad hoc networking, and shows SCR is a promising solution. Specifically, it does not suffer from congestion collapse as the density of contending nodes grows, it does not suffer from hidden or exposed node effects, it achieves high capacities with a spatial usage exceeding 1 (i.e. more than one packet exchange in the area covered by a transmission), and it facilitates the integration of new physical layer capacity increasing technologies.
Style APA, Harvard, Vancouver, ISO itp.
4

Cui, Hui, i Glen Mudra. "Authenticated Key Exchange under Bad Randomness, Revisited". Mathematics 11, nr 12 (15.06.2023): 2721. http://dx.doi.org/10.3390/math11122721.

Pełny tekst źródła
Streszczenie:
A bad randomness may cause catastrophic results in security; thus, it is of importance to make cryptographic systems secure against bad randomness. In this paper, we focus on a practical situation where an adversary is able to force participants in an authenticated key exchange (AKE) system to reuse the random values and the functions of these values, called related randomness attack (RRA). Following the existing randomness resetting security model of AKE and the RRA security model of public-key encryption, we present a model of RRA security for authenticated key exchange, as well as the necessary restrictions on the related randomness functions used to obtain the security definition. Then we show how a related randomness attack adversary breaks the security of some existing AKE protocols, and propose some constructions of RRA-secure authenticated key exchange in the random oracle model and standard model, respectively.
Style APA, Harvard, Vancouver, ISO itp.
5

Goncharov, M. V., i K. A. Kolosov. "On interoperability of metadata within RNPLS&T’s Single Open Information Archive". Scientific and Technical Libraries, nr 10 (12.11.2021): 45–62. http://dx.doi.org/10.33186/1027-3689-2021-10-45-62.

Pełny tekst źródła
Streszczenie:
Russian National Public Library for Science and Technology has been developing the Single Open Information Archive (UOIA) to merge all digital full-text resources created or acquired by the Library. The authors examine the issues of interoperability when exchanging metadata between UOIA built on library automation software and open archives using OAI-PMH technology for metadata acquisition. Interoperability in information exchange between different ALIS is provided, for example, through applying SRU/SRW protocol and metadata scheme, while metadata exchange between OA repositories is provided mainly within Dublin Core (DC) scheme. ALIS – OA metadata transmission with transformation into DC results in information loss and prevents unambiguous reverse transformation.For a long time, DSpace has been the most popular software for open digital repositories. This product enables OAI-PMH metadata acquisition in DC and Qualified DC (QDC) formats, and supports Object Reuse and Exchange (ORE) standard, which enables to describe aggregated resources. ORE in DSpace enables to collect not only metadata but also connected files and to receive other connected data provided by importing source. DSpace uses rather simple ORE format based on Atom XML that allows binding several files of different functionality with RDF-triplets.The OAI-PMH software connector is designed for RNPLS&T SOIA and enables to present metadata in DC, QDC, MARC21, and ORE formats, which supports interoperability in information exchange with OA repositories with DSpace software. Beside metadata transmission, transmission of various data types is possible, e. g. document text or license information. Further development is to expand format structure to represent associated data, in particular using RDF.
Style APA, Harvard, Vancouver, ISO itp.
6

Li, Wei, i Xin Wang. "Construction of Modularized English Teaching Platform for Multimedia Wireless Network Based on NS2 Simulation Software". Mobile Information Systems 2021 (19.10.2021): 1–10. http://dx.doi.org/10.1155/2021/5329208.

Pełny tekst źródła
Streszczenie:
Using the NS2 network simulation tool to teach the “wireless network” course can enhance students’ understanding of wireless network protocols through visualization and can also improve students’ ability to analyze problems hands on. We built a multimedia wireless network modularized English teaching platform based on NS2 simulation software; made full use of the rich components and network resources provided by NS2 to achieve a high degree of code reuse and reduce the time for developing simulation codes; designed the overall framework of this multimedia wireless network modular English teaching platform based on the B/S structure; and solved the weight coefficient and importance value of the learning input evaluation index, based on the feedback elite teaching optimization algorithm, the improved teaching formula, the increase in the number of exchanges, and the improvement in the learner’s performance. The experimental results show that the LEACH and LEACH-C protocols of the clustered NS2 simulation software have more surviving nodes most of the time, which indicates that the clustering routing protocol has better performance.
Style APA, Harvard, Vancouver, ISO itp.
7

Hardwick, Martin. "On STEP-NC and the Complexities of Product Data Integration". Journal of Computing and Information Science in Engineering 4, nr 1 (1.03.2004): 60–67. http://dx.doi.org/10.1115/1.1641188.

Pełny tekst źródła
Streszczenie:
For twenty years the manufacturing domain has been seeking to share product model data by defining an entity relationship model covering the life cycle of geometrically defined products. The data sharing is implemented by selecting subsets of these entities and relationships to define data exchange standards for CAD, CAE, CAM, CNC and PDM systems. The approach requires agreement on how data will be reused across the domains so an organization has been meeting to manage the required data definitions. Considerable success was achieved in 1995 when a standard was proposed and implemented by industry as a way to move 3D geometry between CAD systems. Now, a new protocol for exchanging manufacturing process information between CAM systems and CNC devices is being released. This protocol reuses much of the data defined for the other domains and will allow CNC manufacturing tools to process 3D data, but the complexity of the specification is causing controversy. In this paper we report on the new specification and analyze the advantages and disadvantages of its approach to defining CNC control programs.
Style APA, Harvard, Vancouver, ISO itp.
8

Meyer, Max-Arno, Lina Sauter, Christian Granrath, Hassen Hadj-Amor i Jakob Andert. "Simulator Coupled with Distributed Co-Simulation Protocol for Automated Driving Tests". Automotive Innovation 4, nr 4 (16.10.2021): 373–89. http://dx.doi.org/10.1007/s42154-021-00161-1.

Pełny tekst źródła
Streszczenie:
AbstractTo meet the challenges in software testing for automated vehicles, such as increasing system complexity and an infinite number of operating scenarios, new simulation methods must be developed. Closed-loop simulations for automated driving (AD) require highly complex simulation models for multiple controlled vehicles with their perception systems as well as their surrounding context. For the realization of such models, different simulation domains must be coupled with co-simulation. However, widely supported model integration standards such as functional mock-up interface (FMI) lack native support for distributed platforms, which is a key feature for AD due to the computational intensity and platform exclusivity of certain models. The newer FMI companion standard distributed co-simulation protocol (DCP) introduces platform coupling but must still be used in conjunction with AD co-simulations. As part of an assessment framework for AD, this paper presents a DCP compliant implementation of an interoperable interface between a 3D environment and vehicle simulator and a co-simulation platform. A universal Python wrapper is implemented and connected to the simulator to allow its control as a DCP slave. A C-code-based interface enables the co-simulation platform to act as a DCP master and to realize cross-platform data exchange and time synchronization of the environment simulation with other integrated models. A model-in-the-loop use case is performed with the traffic simulator CARLA running on a Linux machine connected to the co-simulation master xMOD on a Windows computer via DCP. Several virtual vehicles are successfully controlled by cooperative adaptive cruise controllers executed outside of CARLA. The standard compliance of the implementation is verified by exemplary connection to prototypic DCP solutions from 3rd party vendors. This exemplary application demonstrates the benefits of DCP compliant tool coupling for AD simulation with increased tool interoperability, reuse potential, and performance.
Style APA, Harvard, Vancouver, ISO itp.
9

Yavari, Mostafa, Masoumeh Safkhani, Saru Kumari, Sachin Kumar i Chien-Ming Chen. "An Improved Blockchain-Based Authentication Protocol for IoT Network Management". Security and Communication Networks 2020 (26.10.2020): 1–16. http://dx.doi.org/10.1155/2020/8836214.

Pełny tekst źródła
Streszczenie:
Communication security between IoT devices is a major concern in this area, and the blockchain has raised hopes that this concern will be addressed. In the blockchain concept, the majority or even all network nodes check the validity and accuracy of exchanged data before accepting and recording them, whether this data is related to financial transactions or measurements of a sensor or an authentication message. In evaluating the validity of an exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices information with distributed attitude a new authentication protocol based on blockchain is proposed and it is claimed that this protocol satisfies user privacy preserving and security. However, in this paper, we show that this protocol has security vulnerabilities against secret disclosure, replay, traceability, and Token reuse attacks with the success probability of 1 and constant complexity of also 1. We also proposed an improved blockchain-based authentication protocol (IBCbAP) that has security properties such as secure access management and anonymity. We implemented IBCbAP using JavaScript programming language and Ethereum local blockchain. We also proved IBCbAP’s security both informally and formally through the Scyther tool. Our comparisons showed that IBCbAP could provide suitable security along with reasonable cost.
Style APA, Harvard, Vancouver, ISO itp.
10

Gilissen, Valentijng, i Hella Hollander. "Archiving the Past While Keeping up with the Times". Studies in Digital Heritage 1, nr 2 (14.12.2017): 194–205. http://dx.doi.org/10.14434/sdh.v1i2.23238.

Pełny tekst źródła
Streszczenie:
The e-depot for Dutch archaeology started as a project at Data Archiving and Networked Services (DANS) in 2004 and developed into a successful service, which has ever since been part of the national archaeological data workflow of the Netherlands.While continuously processing archaeological datasets and publications and developing expertise regarding data preservation, various developments are taking place in the data landscape and direct involvement is necessary to ensure that the needs of the designated community are best met. Standard protocols must be defined for the processing of data with the best guarantees for long-term preservation and accessibility. Monitoring the actual use of file formats and the use of their significant characteristics within specific scientific disciplines is needed to keep strategies up-to-date.National developments includes the definition of a national metadata exchange protocol, its accommodation in the DANS EASY self-deposit archive and its role in the central channelling of information submission. In international context, projects such as ARIADNE and PARTHENOS enable further developments regarding data preservation and dissemination. The opportunities provided by such international projects enriched the data by improving options for data reuse, including allowing for the implementation of a map-based search facility on DANS EASY. The projects also provide a platform for sharing of expertise via international collaboration.This paper will detail the positioning of the data archive in the research data cycle and show examples of the data enrichment enabled by collaboration within international projects.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Reuse and protocol exchange"

1

Djaffardjy, Marine. "Pipelines d'Analyse Bioinformatiques : solutions offertes par les Systèmes de Workflows, Cadre de représentation et Étude de la Réutilisation". Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG059.

Pełny tekst źródła
Streszczenie:
La bioinformatique est un domaine multidisciplinaire qui combine biologie, informatique et statistiques, permettant de mieux comprendre les mécanismes du vivant.Son fondement repose essentiellement sur l'analyse des données biologiques.L'émergence de nouvelles technologies, en particulier les avancées majeures dans le domaine du séquençage, a entraîné une croissance exponentielle des données, posant de nouveaux défis en matière d'analyse et de gestion des données.Pour exploiter ces données, des pipelines sont utilisés, enchaînant des outils et des processus informatiques pour conduire les analyses de manière fiable et efficace. Cependant, la crise de la reproductibilité dans la recherche scientifique souligne la nécessité de rendre les analyses reproductibles et réutilisables par des tiers.Les systèmes de workflows scientifiques ont émergé comme une solution pour rendre les pipelines plus structurés, compréhensibles et reproductibles. Les workflows décrivent des procédures en plusieurs étapes coordonnant des tâches et leurs dépendances de données. Ces systèmes aident les bioinformaticiens à concevoir et exécuter des workflows, et facilitent leur partage et réutilisation. En bioinformatique, les systèmes de workflows les plus populaires sont Galaxy, Snakemake, et Nextflow.Cependant, la réutilisation des workflows fait face à des difficultés, notamment l'hétérogénéité des systèmes de workflows, le manque d'accessibilité des workflows et le besoin de bases de données publiques de workflows. De plus, l'indexation et le développement de moteurs de recherche de workflows sont nécessaires pour faciliter la recherche et la réutilisation des workflows.Dans un premier temps, nous avons développé une méthode d'analyse des spécifications de workflows afin d'extraire plusieurs caractéristiques représentatives à partir d'un ensemble de données de workflows. Notre objectif était de proposer un cadre standard pour leur représentation, indépendamment de leur langage de spécification.Dans un second temps, nous avons sélectionné un ensemble de caractéristiques de ces workflows et les avons indexées dans une base de données relationnelle, puis dans un format structuré sémantique.Enfin, nous avons mis en place une approche pour détecter les similarités entre les workflows et les processeurs, permettant ainsi d'observer les pratiques de réutilisation adoptées par les développeurs de workflows
Bioinformatics is a multidisciplinary field that combines biology, computer science, and statistics, aiming to gain a better understanding of living mechanisms. It relies primarily on the analysis of biological data. Major technological improvements, especially sequencing technologies, gave rise to an exponential increase of data, laying out new challenges in data analysis and management.In order to analyze this data, bioinformaticians use pipelines, which chain computational tools and processes. However, the reproducibility crisis in scientific research highlights the necessity of making analyses reproducible and reusable by others.Scientific workflow systems have emerged as a solution to make pipelines more structured, understandable, and reproducible. Workflows describe procedures with multiple coordinated steps involving tasks and their data dependencies. These systems assist bioinformaticians in designing and executing workflows, facilitating their sharing and reuse. In bioinformatics, the most popular workflow systems are Galaxy, Snakemake, and Nextflow.However, the reuse of workflows faces challenges, including the heterogeneity of workflow systems, limited accessibility to workflows, and the need for public workflow databases. Additionally, indexing and developing workflow search engines are necessary to facilitate workflow discovery and reuse.In this study, we developed an analysis method for workflow specifications to extract several representative characteristics from a dataset of workflows. The goal was to propose a standardized representation framework independent of the specification language. Additionally, we selected a set of workflow characteristics and indexed them into a relational database and a structured semantic format. Finally, we established an approach to detect similarity between workflows and between processors, enabling us to observe the reuse practices adopted by workflow developers
Style APA, Harvard, Vancouver, ISO itp.
2

Soltwisch, Rene Alexander. "The Inter-Domain Key Exchange Protocol". Doctoral thesis, [S.l.] : [s.n.], 2006. http://hdl.handle.net/11858/00-1735-0000-0006-B403-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Nilsson, Kim. "Reactive Networking using Dynamic Link Exchange Protocol". Thesis, KTH, Kommunikationsnät, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-154832.

Pełny tekst źródła
Streszczenie:
This master thesis studies the possibilities of using a radio-router protocol in order to increase the quality of service in dynamic tactical network environments. We cover three radio-router protocols with emphasis on Dynamic Link Exchange Protocol (DLEP). Many applications, such as voice and video communication, have bandwidth and latency requirements which need to be fulfilled in order to provide a sufficient level of quality. This poses a problem in tactical network environments where links are typically dynamic and both bandwidth andlatency can vary. A radio-router protocol can alleviate this problem and also improve the routing in a network by allowing routers to take part of link-layer information. By using a radio link emulator (RLE) developed by Saab we are able to simulate dynamic network environments. We have performed two experiments by combining the RLE and an implementation of a subset ofthe DLEP specification draft. Both experiments simulate typical military network scenarios and allow us to analyse the effects of utilizing link-layerfeedback.Our results show that by using DLEP it is possible to provide better quality of service in highly dynamic conditions. We also show that DLEP can influence Optimized Link State Routing (OLSR) by making OLSR aware of changes in the network topology. This leads to a reduced network convergence time with only a small increase in OLSR overhead.
Style APA, Harvard, Vancouver, ISO itp.
4

Chandramohan, Vijay. "Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol". [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000128.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Sardana, Divya. "Control-channel Reuse-based Multi-channel MAC Protocol for Ad Hoc Networks". University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1249856000.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Page, Shannon Charles. "Testing Protocol Development for a Proton Exchange Membrane Fuel Cell". Thesis, University of Canterbury. Department of Mechanical Engineering, 2007. http://hdl.handle.net/10092/3519.

Pełny tekst źródła
Streszczenie:
Fuel cell technology has undergone significant development in the past 15 years, spurred in part by its unique energy conversion characteristics; directly converting chemical energy to electrical energy. As fuel cell technology has past through the prototype/pre-commercialisation development, there is increasing interest in manufacturing and application issues. Of the six different fuel cell types pursued commercially, the Proton Exchange Membrane (PEM) fuel cell has received the greatest amount of research and development investment due to its suitability in a variety of applications. A particular application, to which state-of-the art PEMFC technology is suited, is backup/uninterruptible power supply (UPS) systems, or stand-by power systems. The most important feature of any backup/UPS system is reliability. Traditional backup power systems, such as those utilising valve regulated lead acid (VRLA) batteries, employ remote testing protocols that acquire battery state-of-health and state-of-charge information. This information plays a critical role in system management and reliability assurance. A similar testing protocol developed for a PEM fuel cell would be a valuable contribution to the commercialization of these systems for backup/UPS applications. This thesis presents a novel testing and analysis procedure, specifically designed for a PEM fuel cell in a backup power application. The test procedure electronically probes the fuel cell in the absence of hydrogen. Thus, the fuel cell is in an inactive, or passive, state throughout the testing process. The procedure is referred to as the passive state dynamic behaviour (PSDB) test. Analysis and interpretation of the passive test results is achieved by determining the circuit parameter values of an equivalent circuit model (ECM). A novel ECM of a fuel cell in a passive state is proposed, in which physical properties of the fuel cell are attributed to the circuit model components. Therefore, insight into the physical state of the fuel cell is achieved by determining the values of the circuit model parameters. A method for determining the circuit parameter values of many series connected cells (a stack) using the results from a single stack test is also presented. The PSDB test enables each cell in a fuel cell stack to be tested and analysed using a simple procedure that can be incorporated into a fuel cell system designed for backup power applications. An experimental system for implementing the PSDB test and evaluating the active performance of three different PEM fuel cells was developed. Each fuel cell exhibited the same characteristic voltage transient when subjected to the PSDB test. The proposed ECM was shown to accurately model the observed transient voltage behaviour of a single cell and many series connected cells. An example of how the PSDB test can provide information on the active functionality of a fuel cell is developed. This method consists of establishing baseline performance of the fuel cell in an active state, in conjunction with a PSDB test and identification of model parameter values. A subsequent PSDB test is used to detect changes in the state of the fuel cell that correspond to performance changes when the stack is active. An explicit example is provided, where certain cells in a stack were purposefully humidified. The change in state of the cells was identified by the PSDB test, and the performance change of the effected cells was successfully predicted. The experimental test results verify the theory presented in relation to the PSDB test and equivalent circuit model.
Style APA, Harvard, Vancouver, ISO itp.
7

Ninet, Tristan. "Formal verification of the Internet Key Exchange (IKEv2) security protocol". Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S002.

Pełny tekst źródła
Streszczenie:
Dans cette thèse, nous analysons le protocole IKEv2 à l'aide de trois outils de vérification formelle : Spin, ProVerif et Tamarin. Pour effectuer l'analyse avec Spin, nous étendons une méthode existante de modélisation. En particulier, nous proposons un modèle de la signature numérique, du MAC et de l'exponentiation modulaire, nous simplifions le modèle d'adversaire pour le rendre applicable à des protocoles complexes, et nous proposons des modèles de propriétés d'authentification. Nos analyses montrent que l'attaque par réflexion, une attaque trouvée par une précédente analyse, n'existe pas. De plus, nos analyses avec ProVerif et Tamarin produisent de nouvelles preuves concernant les garanties d'accord non injectif et d'accord injectif pour IKEv2 dans le modèle non borné. Nous montrons ensuite que la faille de pénultième authentification, une vulnérabilité considérée comme bénigne par les analyses précédentes, permet en fait d'effectuer un nouveau type d'attaque par déni de service auquel IKEv2 est vulnérable : l'Attaque par Déviation. Cette attaque est plus difficile à détecter que les attaques par déni de service classiques mais est également plus difficile à réaliser. Afin de démontrer concrètement sa faisabilité, nous attaquons avec succès une implémentation open-source populaire de IKEv2. Les contre-mesures classiques aux attaques DoS ne permettent pas d'éviter cette attaque. Nous proposons alors deux modifications simples du protocole, et prouvons formellement que chacune d'entre elles empêche l'Attaque par Déviation
In this thesis, we analyze the IKEv2 protocol specification using three formal verification tools: Spin, ProVerif and Tamarin. To perform the analysis with Spin, we extend and improve an existing modeling method with a simpler adversary model and a model for common cryptographic primitives and Lowe's authentication properties. As a result we show that the reflection attack, an attack found by a previous analysis, is actually not applicable. Moreover, our analysis using ProVerif and Tamarin provides new results regarding non-injective agreement and injective agreement guaranties of IKEv2 in the unbounded model. We then show that the penultimate authentication flaw, a vulnerability that was considered harmless by previous analyses, actually allows for a new type of Denial-of-Service attack, which works against IKEv2: the Deviation Attack. The Deviation Attack is harder to detect than existing DoS attacks, but is also harder to perform. To concretely demonstrate the attack, we successfully implement it against a popular open-source implementation of IKEv2. Finally, we study the use of existing DoS countermeasures and existing configuration options to defeat the attack, but we only find mitigations or incomplete workarounds. We therefore tackle the problem at a higher level: we propose two possible inexpensive modifications of the protocol, and formally prove that they both prevent the attack
Style APA, Harvard, Vancouver, ISO itp.
8

Thomson, Derek Stewart. "The development of packaged, reusable building services components : a pilot study in the UK national health service". Thesis, Heriot-Watt University, 2000. http://hdl.handle.net/10399/1165.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Buck, Randall Jay. "WiFu Transport: A User-level Protocol Framework". BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2959.

Pełny tekst źródła
Streszczenie:
It is well known that the transport layer protocol TCP has low throughput and is unfair in wireless mesh networks. Transport layer solutions for mesh networks have been primarily validated using simulations with simplified assumptions about the wireless network. The WiFu Transport framework complements simulator results by allowing developers to easily create and experiment with transport layer protocols on live networks. We provide a user-space solution that is flexible and promotes code reuse while maintaining high performance and scalability. To validate WiFu Transport we use it to build WiFu TCP, a decomposed Tahoe solution that preserves TCP semantics. Furthermore, we share other WiFu developers' experiences building several TCP variants as well as a hybrid protocol to demonstrate flexibility and code reuse. We demonstrate that WiFu Transport performs as well as the Linux kernel on 10 and 100 Mbps Ethernet connections and over a one-hop wireless connection. We also show that our WiFu TCP implementation is fair and that the framework also scales to support multiple threads.
Style APA, Harvard, Vancouver, ISO itp.
10

Gustavsson, C. C. Magnus. "Mail Exchange Protocol (MEP): Ett utkast till nytt protokoll för elektronisk post". Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2698.

Pełny tekst źródła
Streszczenie:

SMTP, the current protocol for sending electronic mail (e-mail) over the Internet, has for many years suffered from several problems and limitations. When it was designed, well over twenty years ago, the requirements for e-mail were very different from those of today. A message was a text message in English, and both user and machine were explicitly named in the address. The protocol was not designed to transfer other types of messages, and no mechanism was included to verify the identity of the sender.

In order to solve these shortcomings, a new e-mail protocol needs to be defined. This report specifies a basis for what such a protocol may look like. The protocol has been designed to be easy to modify and expand, as well as to benefit from more recent ideas and technology. Binary message content is transferred without conversion, sender addresses are verified, and the address format is flexible. Along with the specification of the protocol, a sample implementation has been provided.

Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Reuse and protocol exchange"

1

Canada Mortgage and Housing Corporation., red. Water reuse standards and verification protocol. [Ottawa]: CMHC, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Canada Mortgage and Housing Corporation., red. Water reuse standards and verification protocol. Ottawa: Canada Mortgage and Housing Corporation, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Curtis, Parks, i National Institute of Standards and Technology (U.S.), red. Initial Graphics Exchange Specification hybrid microcircuit application protocol. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Community, Southern African Development. Protocol on Culture, Information and Sport. [Gaborone]: Southern African Development Community, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Institute Of Electrical and Electronics Engineers. Information technology -- telecommunications and information exchange between systems -- local and metropolitan area networks -- common specifications--: Part 4: system load protocol. New York, N.Y: Institute of Electrical and Electronics Engineers, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

United States. Department of State, red. Double taxation: Convention between the United States of America and Japan, signed at Washington, November 6, 2003, with protocol and exchange of notes. Washington, D.C.]: U.S. Dept. of State, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Protocol amending tax convention with Germany: Report (to accompany Treaty doc. 109-20 and exchange of notes dated August 17, 2006 (EC-2046)). Washington, D.C: U.S. G.P.O., 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

China. Double taxation, taxes on income: Agreement between the United States of America and the People's Republic of China, signed at Beijing April 30, 1984 with Protocol and exchange of notes and protocol signed at Beijing May 10, 1986. Washington, D.C: Dept. of State, 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Mexico. Taxation, information exchange: Agreement between the United States of America and Mexico, signed at Washington November 9, 1989 and protocol signed at Mexico September 8, 1994. Washington, D.C: Dept. of State, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Mexico. Taxation, information exchange: Agreement between the United States of America and Mexico, signed at Washington November 9, 1989 and protocol signed at Mexico September 8, 1994. Washington, D.C: Dept. of State, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Reuse and protocol exchange"

1

Liu, Chao, Zhongxiang Zheng i Guangnan Zou. "Key Reuse Attack on NewHope Key Exchange Protocol". W Lecture Notes in Computer Science, 163–76. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12146-4_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Ma, Jianfeng, Changguang Wang i Zhuo Ma. "Authenticated Key Exchange Protocol". W Security Access in Wireless Local Area Networks, 231–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Rafat, Khan Farhan. "A Stealth Key Exchange Protocol". W Advances in Intelligent Systems and Computing, 675–95. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22868-2_48.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Barcau, Mugurel, Vicenţiu Paşol, Cezar Pleşca i Mihai Togan. "On a Key Exchange Protocol". W Innovative Security Solutions for Information Technology and Communications, 187–99. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69284-5_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

He, Lihong. "Secure Group Key Exchange Protocol". W Electrical Engineering and Control, 391–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21765-4_49.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Oniz, Cagil Can, Erkay Savas i Albert Levi. "A Fair Multimedia Exchange Protocol". W Computer and Information Sciences - ISCIS 2005, 342–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11569596_37.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Shanker, Udai, B. Vidyareddi i Anupam Shukla. "PERDURABLE: A Real Time Commit Protocol". W Recent Trends in Information Reuse and Integration, 1–17. Vienna: Springer Vienna, 2011. http://dx.doi.org/10.1007/978-3-7091-0738-6_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Jiménez, Joan Campmany, Iza Romanowska, Rubina Raja i Eivind Heldaas Seland. "2Modelling an Urban Hinterland. The Case of Roman Palmyra". W Exchange and Reuse in Roman Palmyra, 7–24. Turnhout, Belgium: Brepols Publishers, 2023. http://dx.doi.org/10.1484/m.spah-eb.5.132169.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Żuchowska, Marta. "8Textile Economy of Roman Palmyra". W Exchange and Reuse in Roman Palmyra, 83–98. Turnhout, Belgium: Brepols Publishers, 2023. http://dx.doi.org/10.1484/m.spah-eb.5.132175.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Butcher, Kevin. "3Circuits of Exchange: Palmyrene Coins and Roman Monetary Plurality". W Exchange and Reuse in Roman Palmyra, 25–36. Turnhout, Belgium: Brepols Publishers, 2023. http://dx.doi.org/10.1484/m.spah-eb.5.132170.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Reuse and protocol exchange"

1

Saeed, Maryam, Hadi Shahriar Shahhoseini, Ali Mackvandi, Mohammad Reza Rezaeinezhad, Mansour Naddafiun i Mohammad Zare Bidoki. "A secure two-party password-authenticated key exchange protocol". W 2014 IEEE International Conference on Information Reuse and Integration (IRI). IEEE, 2014. http://dx.doi.org/10.1109/iri.2014.7051926.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Pedditi, Sandeep Reddy, Du Zhang i Chung-E. Wang. "FIEP: An initial design of a firewall information exchange protocol". W 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI). IEEE, 2013. http://dx.doi.org/10.1109/iri.2013.6642446.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ni, Peifang. "Augmented Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies without Scripts". W 8th International Conference on Artificial Intelligence and Fuzzy Logic System (AIFZ 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121605.

Pełny tekst źródła
Streszczenie:
Zero-Knowledge Contingent Payment presents how Bitcoin contracts can provide a solution for the so-called fair exchange problem.Banasik, W. et al. first presented an efficient ZeroKnowledge Contingent Payment protocol for a large class of NP-relations, which is a protocol for selling witness. It obtains fairness in the following sense: if the seller aborts the protocol without broadcasting the final message then the buyer finally gets his payment back. However, we find that the seller in the protocol could refuse to broadcast the final signature of the transaction without any compensation for the buyer. As a result, the buyer cannot get the witness from the final signature of the transaction and has the payment for the witness locked until finishing the large computation for a secret signing key. In this paper, we fix this problem by augmenting the efficient Zero-Knowledge Contingent Payment protocol. We present a new protocol where the seller needs to provide the deposit before the zero-knowledge proof of knowledge of the witness being sold. And then the buyer could obtain the seller's witness if the seller broadcasts the final signature of the transaction and gets the payment and his deposit. Otherwise, the buyer could get back the payment and obtain the seller's deposit. This new augmented protocol is constructed without any new assumptions.
Style APA, Harvard, Vancouver, ISO itp.
4

Beringer, Dorothea, Laurence Melloul i Gio Wiederhold. "A reuse and composition protocol for services". W the 1999 symposium. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/303008.303027.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Harrison, Andrew, Ian Harvey, Andrew Jones, David Rogers i Ian Taylor. "Object reuse and exchange for publishing and sharing workflows". W the 6th workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2110497.2110506.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Yang, Xuan, Zhaoping Yu i Bin Kang. "Chameleon-Based Optimistic Fair Exchange Protocol". W 2008 International Conference on Embedded Software and Systems. IEEE, 2008. http://dx.doi.org/10.1109/icess.2008.26.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Ganjavi, Ramin, Maryam Rajabzadeh Asaar i Mahmoud Salmasizadeh. "A traceable optimistic fair exchange protocol". W 2014 11th International ISC Conference on Information Security and Cryptology (ISCISC). IEEE, 2014. http://dx.doi.org/10.1109/iscisc.2014.6994041.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Yiyao Hao, D. M. Havey i D. A. Turner. "An exchange protocol for alternative currencies". W International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II. IEEE, 2005. http://dx.doi.org/10.1109/itcc.2005.78.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Sofu Risqi, Y. S., i Susila Windarta. "Design key exchange protocol SOFU-11". W 2016 International Seminar on Intelligent Technology and its Applications (ISITIA). IEEE, 2016. http://dx.doi.org/10.1109/isitia.2016.7828671.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Yi, Tong, Minyong Shi i Wenqian Shang. "Personalized two party key exchange protocol". W 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS). IEEE, 2015. http://dx.doi.org/10.1109/icis.2015.7166659.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Reuse and protocol exchange"

1

Mahy, R., i B. Tate. Connection Reuse in the Session Initiation Protocol (SIP). Redaktor V. Gurbani. RFC Editor, czerwiec 2010. http://dx.doi.org/10.17487/rfc5923.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Kaufman, C., red. Internet Key Exchange (IKEv2) Protocol. RFC Editor, grudzień 2005. http://dx.doi.org/10.17487/rfc4306.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ratliff, S., S. Jury, D. Satterwhite, R. Taylor i B. Berry. Dynamic Link Exchange Protocol (DLEP). RFC Editor, czerwiec 2017. http://dx.doi.org/10.17487/rfc8175.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Rose, M. The Blocks Extensible Exchange Protocol Core. RFC Editor, marzec 2001. http://dx.doi.org/10.17487/rfc3080.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Feinstein, B., i G. Matthews. The Intrusion Detection Exchange Protocol (IDXP). RFC Editor, marzec 2007. http://dx.doi.org/10.17487/rfc4767.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Lear, E., i K. Crozier. Using the NETCONF Protocol over the Blocks Extensible Exchange Protocol (BEEP). RFC Editor, grudzień 2006. http://dx.doi.org/10.17487/rfc4744.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Clancy, T., i W. Arbaugh. Extensible Authentication Protocol (EAP) Password Authenticated Exchange. RFC Editor, listopad 2006. http://dx.doi.org/10.17487/rfc4746.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kaufman, C., P. Hoffman, Y. Nir i P. Eronen. Internet Key Exchange Protocol Version 2 (IKEv2). RFC Editor, wrzesień 2010. http://dx.doi.org/10.17487/rfc5996.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Kaufman, C., P. Hoffman, Y. Nir, P. Eronen i T. Kivinen. Internet Key Exchange Protocol Version 2 (IKEv2). RFC Editor, październik 2014. http://dx.doi.org/10.17487/rfc7296.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Neumann, Scott, Jeramy Lochner, Siddharth Sridhar, Scott Mix, Olga Kuchar, Surya Singh, Mark Rice i Charles Schmidt. Universal Utility Data Exchange (UUDEX) - Protocol Design. Office of Scientific and Technical Information (OSTI), sierpień 2019. http://dx.doi.org/10.2172/1776875.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii