نتایج جستجو برای: token based algorithm
تعداد نتایج: 3349700 فیلتر نتایج به سال:
The WLCG is modernizing its security infrastructure, replacing X.509 client authentication with the newer industry standard of JSON Web Tokens (JWTs) obtained through Open ID Connect (OIDC) protocol. There a wide variety software available using standards, but most it for browser-based applications and doesn’t adapt well to command line-based used heavily in High Throughput Computing (HTC). OID...
Security Dynamics In order for Computing Systems to remain a "Quarterly dedicated to the analysis and understanding of advanced computing systems," it is necessary to make the following clarification regarding an article in the V/inter 1996 issue (Volume 9, Number 1). The article in question was entitled "Independent One-Time Passwords," and authored by Aviel D. Rubin of Bellcore. In this artic...
On-line traffic, such as conversational call, live video, serves a large group of applications in the internet now days. An important feature of on-line traffic is that they are not pre-recorded and no exact information about each session’s traffic is known before the traffic happens. S-BIND (Confidence-levelbased Statistical Bounding Interval-length Dependent) traffic model was proposed to cha...
Non-Fungible Token (NFT) is a blockchain-based token that securely maps copyright ownership to digital assets, these assets exist on the blockchain network which have identification codes and metadata are unique different from each other (one-of-the-kind). . It can also be interpreted as asset represents variety of considered unique. NFTs traded for (images, music, videos, virtual creations) wh...
An ad-hoc sensor network is a network of numerous wireless nodes where each node has sensing, storage, computation, communication and possibly actuating resources. Each node has a limited power source that determines the lifetime of the node. Therefore, energy is the most critical factor in sensor networks in all of its design levels (i.e. hardware, network layers and applications). Numerous st...
The issue in today’s society is access, whether entering into a restricted building like an office or home, or attempting to access a bank account or credit card. An individual must prove their identity before authorized for utilization. Bruce Schneier, a well-known security expert and CEO of Counterpane Internet Security, states the need to be able to identify, authenticate, and authorize indi...
This paper presents three distributed and decentralized strategies used for token traversal in spanning forest over Mobile Ad Hoc Delay Tolerant Networks. Such networks are characterized by behaviors like disappearance of mobile devices, connection disruptions, network partitioning, etc. Techniques based on tree topologies are well known for increasing the efficiency of network protocols and/or...
The paper describes a new admission control (AC) algorithm for greedy TCP connections. The algorithm has passed positive tests in preproduction QoS IP network [2], developed inside European IST project AQUILA1 network. The algorithm operates per single TCP flow and it assumes the setting of advertised receiver TCP window size for maintaining ideal TCP behaviour (no packet losses). The QoS objec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید