Filtry
wszystkich: 497
Wyniki wyszukiwania dla: CRYPTOGRAPHIC PROTOCOLS
-
AUTOMATED NEGOTIATIONS OVER COLLABORATION PROTOCOL AGREEMENTS
PublikacjaThe dissertation focuses on the augmentation of proactive document - agents with built-in intelligence to recognize execution context provided by devices visited during a business process, and to reach collaboration agreement despite conflicting requirements. The proposed solution, based on intelligent bargaining using neural networks to improve simple multi-issue negotiation between the document and thedevice, requires practically...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublikacjaThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
PublikacjaArtykuł przedstawia środowisko oceny wydajności protokołów ochrony przed tropieniem agentów mobilnych oraz wyniki analiz przeprowadzonych za jego pomocą. Chociaż środowisko projektowano i implementowano z myślą o ewaluacji zaproponowanych przez nas protokołów ochrony przed tropieniem, w trakcie badań okazało się, że może ono zostać również wykorzystane do badań całej klasy protokołów bezpieczeństwa dla agentów mobilnych. Chodzi...
-
Performance analysis of mobility protocols and handover algorithms for IP-based networks
PublikacjaA rapid growth of IP-based networks and services has created the vast collection of resources and functionality available to users by means of a universal method of access - an IP protocol. At the same time, advances in design of mobile electronic devices have allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Following this trend multiple extensions...
-
International Journal of Surgery Protocols
Czasopisma -
Current Protocols in Protein Science
Czasopisma -
Current Protocols in Molecular Biology
Czasopisma -
Current Protocols in Cell Biology
Czasopisma -
Current protocols in mouse biology
Czasopisma -
Cold Spring Harbor Protocols
Czasopisma -
Current Protocols in Human Genetics
Czasopisma -
Current protocols in chemical biology
Czasopisma -
Current protocols in plant biology
Czasopisma -
International Journal of Cryptography and Security
Czasopisma -
International Journal of Applied Cryptography
Czasopisma -
Assessment of the physical fitness of road cyclists in the step and ramp protocols of the incremental test
Publikacja -
The Ethernet POWERLINK Protocol for smart grids elements integration
Publikacja -
The secure transmission protocol of sensor Ad Hoc network
PublikacjaThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Zero-knowledge convincing protocol on quantum bit is impossible
PublikacjaIt is one of fundamental features of quantum formalism that o n one hand it provides a new infor- mation processing resources and on the other hand puts funda mental constraints on the processing of quantum information implying “no-go” theorems for cloni ng [1–3], bit commitment [4, 5] and deleting [6] in quantum theory. Here we ask about possibilit y of “zero knowledge” scenario which, for its simplicity, can be considered as...
-
Ordered multicast protocol based on credited virtual acknowledgment
PublikacjaPrzedstawiono protokół rozgłaszania dla sieci pakietowych oparty na statystycznym przewidywaniu ruchu aplikacji. Pokazano, że wydajność protokołu zbliżona jest do optymalnej w klasie wykorzystującej potwierdzenia wirtualne.
-
IACR Transactions on Cryptographic Hardware and Embedded Systems
Czasopisma -
Interlaboratory Test to Characterize the Cyclic Behavior of Bituminous Interlayers: An Overview of Testing Equipment and Protocols
PublikacjaThe performance assessment of multi-layered pavements strongly depends on the mechanical behavior of the interface between bituminous layers. So far, comprehensive studies have been carried out mainly using quasi-static laboratory tests focusing on the interlayer shear strength at failure. However, it is generally recognized that cyclic shear testing will lead to the determination of parameters which are more closely linked to...
-
Interlaboratory Test to Characterize the Cyclic Behavior of Bituminous Interlayers: An Overview of Testing Equipment and Protocols
PublikacjaThe performance assessment of multi-layered pavements strongly depends on the mechanical behavior of the interface between bituminous layers. So far, comprehensive studies have been carried out mainly using quasi-static laboratory tests focusing on the interlayer shear strength at failure. However, it is generally recognized that cyclic shear testing will lead to the determination of parameters which are more closely linked to...
-
International Workshop on Group-Oriented Cryptographic Protocols
Konferencje -
Grade of service determination methodology in IP networks with SIP protocol
PublikacjaAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
On efficiency of layer 2 of the radio interface protocol stack in UMTS
PublikacjaCelem pracy jest szczegółowa analiza funkcjonowania warstwy łącza danych w podsystemie dostępu radiowego UTRAN systemu UMTS i na tej podstawie przedstawienie szeregu zmian i usprawnień oraz wskazówek odnośnie konfiguracji protokołów, jakie należy w tej warstwie zastosować aby zmaksymalizować jej wydajność głównie pod kątem oferowanej przepływności, wprowadzanych opóźnień oraz wsparcia priorytetów przesyłanego ruchu. Teza pracy...
-
mRNA heptaplex protocol for distinguishing between menstrual and peripheral blood
Publikacja -
Distributed Operation of CHP and Hybrid PV Using Consensus Protocol
Publikacja -
Oral ulcers of COVID-19 patients: a scoping review protocol
Publikacja -
Design of versatile ASIC and protocol tester for CBM readout system
Publikacja -
Transmission protocol simulation framework for the resource-constrained sensor network
PublikacjaIn this paper the simulation framework for simulation of the sensor network protocol is presented. The framework enables the simultaneous development of the sensor network software and the protocol for the wireless data transmission. The advantage of using the framework is the convergence of the simulation with the real software, because the same software is used in real sensor network nodes and in the simulation framework. The...
-
An untraceability protocol for mobile agents and its enhanced security study
PublikacjaArtykuł przedstawia rozszerzoną analizę bezpieczeństwa zaproponowanego przez nas protokołu ochrony przed tropieniem (ang. untraceability protocol) dla agentów mobilnych. Jak dotąd, tak systematyczna analiza bezpieczeństwa nie została przeprowadzona. Co więcej, istniejące znane analizy bezpieczeństwa koncentrują się wyłącznie na atakujących wewnętrznych. Uważamy, że stworzona przez nas lista kontrolna ataków może posłużyć jako...
-
Dynamic host configuration protocol for IPv6 improvements for mobile nodes
PublikacjaIn wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...
-
Methodology of Conformity Testing of VoIP Connections Scenarios for SIP Protocol
PublikacjaConformity and conformity testing have always had a crucial role in telecommunications. These issues are especially important in VoIP technology with SIP protocol as there are many hardware, software and service implementations. In this paper a methodology of automatic conformity testing of VoIP connections scenarios applying to any IP network is proposed. Example implementation of the methodology as Linux shell scripts is presented....
-
Review of Diameter protocol implementations for realization of communication in NGN networks
PublikacjaIn the paper Diameter protocol as well as its applications in the context of Next Generation Network (NGN) are described. Diameter message content and Attribute-Value Pairs (AVPs) concept are presented. Critical review of open source Diameter implementations is carried out. The performed analysis takes into consideration programming language, availability, support and documentation aspects. Basing on the review project fulfilling...
-
Comparison of the main bioactive compounds and antioxidants in garlic and white and red onion after treatment protocols
PublikacjaPolski czosnek, biała i czerwona cebula była blanszowana, gotowana, smażona i poddawana działaniom promieniowania mikrofalowego. Następnie były w nich oznaczane m.in. takie związki jak polifenole, flawonoidy, kwas ascorbinowy i aktywne antyoksydanty. Udowodniono, że blanszowanie, smażenie i poddawanie działaniu promieniowania mikrofalowego nie wpływa znacząco na zmiejszenie zawartości badanych związków w czosnku i cebuli. Wyznaczono...
-
Acute Effects of Varied Back Squat Activation Protocols on Muscle-Tendon Stiffness and Jumping Performance
Publikacja -
Acute Effects of Different Blood Flow Restriction Protocols on Bar Velocity During the Squat Exercise
Publikacja -
Current Protocols in Nucleic Acid Chemistry
Czasopisma -
Current Protocols in Essential Laboratory Techniques
Czasopisma -
Current Protocols in Stem Cell Biology
Czasopisma -
Subgroup and per-protocol analyses from the Hypertension in the Very Elderly Trial
Publikacja -
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublikacjaIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
Experimental certification of an informationally complete quantum measurement in a device-independent protocol
PublikacjaMinimal informationally complete positive operator-valued measures (MIC-POVMs) are special kinds of measurement in quantum theory in which the statistics of their d2-outcomes are enough to reconstruct any d-dimensional quantum state. For this reason, MIC-POVMs are referred to as standard measurements for quantum information.Here, we report an experiment with entangled photon pairs that certifies, for what we believe is the first...
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublikacjaThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Journal of Discrete Mathematical Sciences & Cryptography
Czasopisma -
An Idea Bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs
PublikacjaDla klasy protokołów MAC opartych na przypadkowo krążącym żetonie dononano rozdziału polityki wyłaniania zwycięzcy od strategii wyboru szczeliny dla żądania dostępu. Wyróżniono klasę protokołów RT/ECD, dla której zidentyfikowano typ wynikowej gry niekooperacyjnej. Pokazano, że gra ta zasadniczo różni się od wieloosobowego dylematu więźnia. Zaprojektowano heurystyczną strategię asymptotycznie zniechęcającą do zachowań egoistycznych...
-
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublikacjaA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
Soft Real-Time Communication with WebSocket and WebRTC Protocols Performance Analysis for Web-based Control Loops
PublikacjaThe web browser has become an access window for content and services. The browser is available on almost any device connected to the network, regardless of its intended use: desktop, mobile device, computing server, e-book reader etc. Browsers are used by people to read news, contact the world, to check a bank account, register a visit at the doctor, watching video content, electronic purchases, using web versions of the office...
-
JMIR Research Protocols
Czasopisma