نتایج جستجو برای: token based algorithm

تعداد نتایج: 3349700  

Journal: :Epj Web of Conferences 2021

The WLCG is modernizing its security infrastructure, replacing X.509 client authentication with the newer industry standard of JSON Web Tokens (JWTs) obtained through Open ID Connect (OIDC) protocol. There a wide variety software available using standards, but most it for browser-based applications and doesn’t adapt well to command line-based used heavily in High Throughput Computing (HTC). OID...

Journal: :Computing Systems 1996
John Adams

Security Dynamics In order for Computing Systems to remain a "Quarterly dedicated to the analysis and understanding of advanced computing systems," it is necessary to make the following clarification regarding an article in the V/inter 1996 issue (Volume 9, Number 1). The article in question was entitled "Independent One-Time Passwords," and authored by Aviel D. Rubin of Bellcore. In this artic...

Journal: :The Journal of The British Blockchain Association 2020

2015
Lie Qian

On-line traffic, such as conversational call, live video, serves a large group of applications in the internet now days. An important feature of on-line traffic is that they are not pre-recorded and no exact information about each session’s traffic is known before the traffic happens. S-BIND (Confidence-levelbased Statistical Bounding Interval-length Dependent) traffic model was proposed to cha...

Journal: :Jurnal Pilar Nusa Mandiri 2022

Non-Fungible Token (NFT) is a blockchain-based token that securely maps copyright ownership to digital assets, these assets exist on the blockchain network which have identification codes and metadata are unique different from each other (one-of-the-kind). . It can also be interpreted as asset represents variety of considered unique. NFTs traded for (images, music, videos, virtual creations) wh...

2003
Abhijit Davare David Nguyen Farinaz Koushanfar

An ad-hoc sensor network is a network of numerous wireless nodes where each node has sensing, storage, computation, communication and possibly actuating resources. Each node has a limited power source that determines the lifetime of the node. Therefore, energy is the most critical factor in sensor networks in all of its design levels (i.e. hardware, network layers and applications). Numerous st...

2005
Robby Fussell

The issue in today’s society is access, whether entering into a restricted building like an office or home, or attempting to access a bank account or credit card. An individual must prove their identity before authorized for utilization. Bruce Schneier, a well-known security expert and CEO of Counterpane Internet Security, states the need to be able to identify, authenticate, and authorize indi...

2009
Apivadee Piyatumrong Patricia Ruiz Pascal Bouvry Frédéric Guinand Kittichai Lavangnananda

This paper presents three distributed and decentralized strategies used for token traversal in spanning forest over Mobile Ad Hoc Delay Tolerant Networks. Such networks are characterized by behaviors like disappearance of mobile devices, connection disruptions, network partitioning, etc. Techniques based on tree topologies are well known for increasing the efficiency of network protocols and/or...

2003
Wojciech Burakowski Halina Tarasiuk

The paper describes a new admission control (AC) algorithm for greedy TCP connections. The algorithm has passed positive tests in preproduction QoS IP network [2], developed inside European IST project AQUILA1 network. The algorithm operates per single TCP flow and it assumes the setting of advertised receiver TCP window size for maintaining ideal TCP behaviour (no packet losses). The QoS objec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید