نتایج جستجو برای: access protocol

تعداد نتایج: 557979  

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

2003
Paulo S. Pagliusi Chris J. Mitchell

Currently there are no Internet access authentication protocols available that are lightweight, can be carried over arbitrary access networks, and are flexible enough to be used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/GSM authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of the PA...

2004
Paulo S. Pagliusi Chris J. Mitchell

Currently there are no Internet access authentication protocols available that are lightweight, can be carried over arbitrary access networks, and are flexible enough to be re-used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/UMTS authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of th...

2012
Mitsuru Kanda Yoshihiro Ohba

Constrained devices often have a need for access to a network for their intended services. They have some of the same security requirements for network access authentication as other network devices but the devices and environments that they operate within are quite different. These resource limited devices and the associated network environment pose additional challenges for adopting existing ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده برق و کامپیوتر 1388

چکیده در دهه های اخیر با رشد چشمگیر شبکه های بیسیم اقتضایی امکان دسترسی به شبکه، بدون نیاز به کنترل کننده مرکزی و زیر ساخت سیمی فراهم شده است. تقاضا برای دسترسی به اطلاعات در هر زمان و مکان، ضرورت توسعه این گونه شبکه ها را غیر قابل انکار می نماید. این توسعه بدون افزایش ظرفیت شبکه و استفاده بهینه از پهنای باند امکان پذیر نمی باشد. علاوه بر محدودیت پهنای باند که در تمام شبکه های بیسیم وجود دارد،...

Journal: :RFC 1973
Robert Thomas

A file access protocol (FAP) of the sort proposed by John Day in RFC 520 is a good idea. The following corr~ents suggest improvements (mostly additions) to the protocol described in RFC 520. 1. (Philosophical comment) rrhe intent of both F'I'P and FAP is to make it po ssible for-a user to remotely access f iles. In effect, FTP provides means for a user to have (parts o f) file activity bf the s...

Journal: :Digital Technical Journal 1991
James D. Jones Ajay P. Kachrani Thomas E. Powers

The concept of a "Printer Access Protocol" or "PAP" was introduced during the mid-1980s to provide for comprehensive access to the new generation of more capable, networked printers. The design goals for a PAP need to consider the variety of data presentation protocols in use and the heterogeneous nature of distributed interconnection methods. A Digital printing architecture team adopted an exi...

Journal: :RFC 1997
Chris Newman John G. Myers

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." To view the entire list of current Internet-Drafts, please check the "1id-abstracts.txt" listing contained in the Internet-Drafts Shadow ...

2007
Nishanth R. Sastry Jon Crowcroft Karen R. Sollins

Cities around the world are currently considering building expensive Wi-Fi infrastructure. In urban areas, resident operated Wi-Fi access points (APs) are dense enough to achieve ubiquitous Internet access, provided we can induce the hosts to provide guest Wi-Fi access. However, sharing Wi-Fi involves taking on responsibility for the guest’s actions. Our main contribution is a novel mechanism t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید