-
1تقرير
-
2تقرير
المؤلفون: Tilak, Sameer, Murphy, Amy, Heinzelman, Wendi, Abu-Ghazaleh, Nael B.
مصطلحات موضوعية: Computer Science - Networking and Internet Architecture, C.2.1 Wireless communication, C.2.2 Network Protocols
الوصول الحر: http://arxiv.org/abs/cs/0408024Test
-
3تقرير
المؤلفون: Tilak, Sameer, Abu-Ghazaleh, Nael, Heinzelman, Wendi
مصطلحات موضوعية: Computer Science - Networking and Internet Architecture, Computer Science - Hardware Architecture, C.2.1 Wireless communication, C.2.2 Network Protocols, D.4.2 Storage Management
الوصول الحر: http://arxiv.org/abs/cs/0408020Test
-
4دورية أكاديمية
المؤلفون: Friedman, Timur, Pras, Aiko, Schönwälder, Jürgen
المساهمون: Laboratory of Information, Network and Communication Sciences (LINCS), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut Mines-Télécom Paris (IMT)-Sorbonne Université (SU), Networks and Performance Analysis (NPA), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), University of Twente, Jacobs University = Constructor University Bremen
المصدر: ISSN: 2192-5283 ; Dagstuhl Reports ; https://hal.science/hal-03965415Test ; Dagstuhl Reports, 2017, 7 (3), pp.33--44. ⟨10.4230/DagRep.7.3.33⟩.
مصطلحات موضوعية: ACM Subject Classification K.3.0 General K.3.1 Computer Uses in Education K.3.2 Computer and Information Science Education C.2.0 General C.2.1 Network Architecture and Design C.2.2 Network Protocols C.2.3 Network Operations C.2.5 Local and Wide-Area Networks C.2.6 Internetworking Keywords and phrases computer networks Internet education peer instruction online learning educational technologies Digital Object Identifier 10.4230/DagRep.7.3.33, ACM Subject Classification K.3.0 General, K.3.1 Computer Uses in Education, K.3.2 Computer and Information Science Education, C.2.0 General, C.2.1 Network Architecture and Design, C.2.2 Network Protocols, C.2.3 Network Operations, C.2.5 Local and Wide-Area Networks, C.2.6 Internetworking Keywords and phrases computer networks, Internet, education, peer instruction, online learning, educational technologies Digital Object Identifier 10.4230/DagRep.7.3.33, [INFO]Computer Science [cs]
العلاقة: hal-03965415; https://hal.science/hal-03965415Test; https://hal.science/hal-03965415/documentTest; https://hal.science/hal-03965415/file/dagrep_v007_i003_p033_s17112.pdfTest
الإتاحة: https://doi.org/10.4230/DagRep.7.3.33Test
https://hal.science/hal-03965415Test
https://hal.science/hal-03965415/documentTest
https://hal.science/hal-03965415/file/dagrep_v007_i003_p033_s17112.pdfTest -
5مؤتمر
المصدر: In: ESCAR 2016 - Automotive Cyber Security Conference (Monaco (Germania), - 2016). Proceedings, pp. 1 - 7. -, 2016.
مصطلحات موضوعية: Security, proto, automotive systems, info:eu-repo/classification/acm/K.6.5 Security and protection, info:eu-repo/classification/acm/D.4.6 Security and Protection (Access Control) C.2.2 Network Protocols (SIP)
وصف الملف: application/pdf
العلاقة: http://puma.isti.cnr.it/dfdownloadnew.php?ident=cnr.iit/cnr.iit/2016-A2-014Test; http://puma.isti.cnr.it/rmydownload.php?filename=cnr.iit/cnr.iit/2016-A2-014/2016-A2-014.pdfTest
-
6مؤتمر
مصطلحات موضوعية: Model-based adaptation, Cyber-physical systems, info:eu-repo/classification/acm/D.4.6 Security and Protection (Access Control) C.2.2 Network Protocols (SIP)
وصف الملف: application/pdf
العلاقة: http://puma.isti.cnr.it/dfdownloadnew.php?ident=cnr.iit/cnr.iit/2016-A2-052Test; http://puma.isti.cnr.it/rmydownload.php?filename=cnr.iit/cnr.iit/2016-A2-052/2016-A2-052.pdfTest
-
7دورية أكاديمية
المؤلفون: Jurcut, Anca, Coffey, Tom, Dojen, Reiner
المساهمون: SFI
مصطلحات موضوعية: C.2.2 network protocols, C.2.2.c protocol verification, C.2.8.a algorithm/protocol design and analysis D.4.6 security and privacy protection, D.4.6.b authentication, D.4.6.gverification
العلاقة: 11RFP.1CMS 3340; IEEE Transactions on Dependable and Secure Computing; 16 (6), pp. 969-983; http://dx.doi.org/10.1109/TDSC.2017.2725831Test; 11/RFP.1/CMS 3340; http://hdl.handle.net/10344/7541Test
-
8دورية أكاديمية
-
9
المؤلفون: Anca Delia Jurcut, Reiner Dojen, Tom Coffey
المساهمون: SFI
المصدر: IEEE Transactions on Dependable and Secure Computing. 16:969-983
مصطلحات موضوعية: C.2.8.a algorithm/protocol design and analysis D.4.6 security and privacy protection, Protocol (science), Soundness, 021110 strategic, defence & security studies, Authentication, Interleaving, business.industry, Computer science, C.2.2.c protocol verification, 0211 other engineering and technologies, Cryptography, 02 engineering and technology, Cryptographic protocol, Computer security, computer.software_genre, C.2.2 network protocols, D.4.6.gverification, D.4.6.b authentication, Session (computer science), Electrical and Electronic Engineering, business, computer, Axiom, Computer network
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8e2da175a8d98c8d3f87ad670f631127Test
https://doi.org/10.1109/tdsc.2017.2725831Test -
10دورية أكاديمية
المؤلفون: Wan Du, Jansen Christian Li, Huanle Zhang, Mo Li
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Categories and Subject Descriptors C.2.1 [Network Architecture and Design, Wireless com- munication, C.2.2 [Network Protocols, Protocol archi- tecture Keywords Wireless sensor networks, Data dissemination, Fountain codes, Constructive interference
وصف الملف: application/pdf