Treffer 1 - 20 von 25.641

1

NordVPN: More than just a VPN, it’s a privacy powerhouse.
SINGLETON, SAM
PCWorld. Jun2025, Vol. 43 Issue 6, p40-46. 7p. 5 Color Photographs.

Cyberterrorism Internet protocols Personal computers Password software Personally identifiable... Quantum computers
Zeitschrift
2

ITN CONTINUES ITS IP TRANSFORMATION.
Davies, David
TVB Europe. Jan/Feb2026, p28-30. 3p.

Internet protocols Digital transformation Data transmission system... Network performance
Zeitschrift
3

It Takes a Village: Bridging the Gaps between Current and Formal Specifications for Protocols.
Basin, David ; Foster, Nate ; McMillan, Kenneth L. ; et al.
Communications of the ACM. Aug2025, Vol. 68 Issue 8, p50-61. 12p.

Computer network protoco... Internet protocols Technical specifications Formal methods (Computer... IEEE Standards Board Internet Engineering Tas...
Zeitschrift
4

MarketLine Company Profile: AudioCodes Ltd.
AudioCodes Ltd. MarketLine Company Profile. 6/21/2025, p1-32. 32p.

Internet protocols Information technology i... Israel AudioCodes Ltd.
5

The [formula omitted]-transportation problem: On the value of split transports for the Physical Internet concept.
Boysen, Nils ; Briskorn, Dirk ; Montreuil, Benoit ; et al.
European Journal of Operational Research. Jul2025, Vol. 324 Issue 2, p629-643. 15p.

Internet protocols Sustainable transportati... Freight & freightage Internet Data packeting
Fachzeitschrift
6

Design of a load balancing Objective Function for RPL.
Elmahi, M.Y. ; Osman, N.I.M.
Journal of High Speed Networks. 2024, Vol. 30 Issue 3, p297-319. 23p.

Internet protocols Energy consumption Composite numbers Internet of things Network performance
Fachzeitschrift
7

NordVPN: More than just a VPN, it’s a privacy powerhouse.
YEE, ALAINA
PCWorld. Jul2024, Vol. 42 Issue 7, p44-49. 6p. 6 Color Photographs.

Virtual private networks Internet protocols Personal computers Ad blockers Privacy Password software
Zeitschrift
8

A Certificate-centric Security Oracle for the Trustworthy Internet
Kim, Hyunsoo ; Kang, Sangwi ; Lee, Kyunghan ; et al.
Companion Proceedings of the ACM on Web Conference 2025. :1082-1085

Konferenz
9

Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols.
Kakhki, Arash Molavi ; Jero, Samuel ; Choffnes, David ; et al.
Communications of the ACM. Jul2019, Vol. 62 Issue 7, p86-94. 9p. 2 Diagrams, 2 Charts, 8 Graphs.

Internet protocols Application software Personal computer perfor... Mobile computing TCP/IP Transport protocols (Com...
Zeitschrift
10

On The Hourglass Model.
BECK, MICAH
Communications of the ACM. Jul2019, Vol. 62 Issue 7, p48-57. 10p. 1 Color Photograph, 4 Diagrams.

Computer architecture Internet protocols Unix operating systems
Zeitschrift
11

The Compositional Architecture of the Internet.
ZAVE, PAMELA ; REXFORD, JENNIFER
Communications of the ACM. Mar2019, Vol. 62 Issue 3, p78-87. 10p. 1 Color Photograph, 5 Diagrams.

Internet Internet protocols Computer networks User interfaces Virtual LANs
Zeitschrift
12

Comparative analysis of post-quantum handshake performance in QUIC and TLS protocols.
Montenegro, José A. ; Rios, Ruben ; Bonilla, Javier
Computer Networks. Feb2026, Vol. 275, pN.PAG-N.PAG. 1p.

Quantum computing Internet protocols Cryptography Computer network protoco... Network performance Encryption protocols
Fachzeitschrift
14

A lightweight privacy preservation authentication protocol for IoMT using ECC based blind signature.
Samal, Kalpana ; Sunanda, Shanta Kumari ; Jena, Debasish ; et al.
International Journal of Engineering Business Management. 1/31/2025, p1-13. 13p.

Internet protocols Elliptic curve cryptogra... Internet security Internet of things Medical records
Fachzeitschrift
15

Highly secure authentication and key agreement protocol for the internet of vehicles.
Li, Li ; Fan, XingJuan ; Zhi, BoYuan ; et al.
Telecommunication Systems. Sep2024, Vol. 87 Issue 1, p73-88. 16p.

Access control Internet protocols Security systems Internet Privacy Key agreement protocols...
Fachzeitschrift
16

LDA-IoT : a level dependent authentication for IoT paradigm.
Patel, Chintan ; Doshi, Nishant
Information Security Journal: A Global Perspective. 2022, Vol. 31 Issue 6, p629-656. 28p.

Internet protocols Organizational structure Internet of things Sensor placement Key agreement protocols... Internet security
Fachzeitschrift
17

A Collusion-Resistant DECO-Based Attestation Protocol for Practical Applications
Osmanoǧulu, Murat ; Sen, Ugur ; Selçuk, Ali Aydın
2025 IEEE International Conference on Cyber Security and Resilience (CSR). :234-239

Collusion Resistant Oracles Authentication Smart Contract Verifiable Random Functi... Transport Layer Security
Fachzeitschrift
18

Centralized Panic and Alarm Systems Using Internet Protocols for Supporting Elderly Individuals: a Literature Review
Vijay, A ; VR, Nikkash ; Prabhas, J ; et al.
2025 9th International Conference on Inventive Systems and Control (ICISC) Inventive Systems and Control (ICISC), 2025 9th International Conference on. :1-7 Aug, 2025

Konferenz
19

IPv6 – Adressierungssystem der Zukunft (2).
DE: Das Elektrohandwerk. 6/17/2025, Issue 12, p67-70. 4p.

Internet protocols Internet Internet protocol addres... Internet protocol versio...
Zeitschrift
20

Secure 5G military networking with encryption to link warfighters globally introduced by Persistent Systems.
Military & Aerospace Electronics. Jan/Feb2025, Vol. 36 Issue 1, p30-30. 1/3p.

Data encryption Internet protocols Access control 5G networks Internet security
Zeitschrift

Filter