Search results

Jump to navigation Jump to search

Page title matches

  • ...Querys zu verhindern, wurde bei der neuen Version (v0.6) das Query Routing Protocol implementiert.<br>
    2 KB (292 words) - 14:52, 5 February 2006
  • Each node buffers 50 packets. The protocol buffers additional 50 packets.
    2 KB (340 words) - 11:41, 4 November 2004
  • The server<->client protocol, or the sessions, should provide protection against: ...numbers, but add next to no additional value. Also: SSL is quite a complex protocol and widely deployed implementation errors (ASN.1!) have not been unheard of
    15 KB (2,062 words) - 04:25, 19 June 2006
  • ...ween the Anonymization Layer and the Reputation System a simple line based protocol is used. The Reputation System acts as a TCP server and listens on 127.0.0.
    2 KB (393 words) - 18:46, 25 May 2006
  • ...hatsApp, and more. In this article, I'll focus on X3DH. Unfortunately, the protocol is not post-quantum secure (PQ-secure), which can be attributed to its heav =Properties of the Signal Protocol=
    13 KB (1,927 words) - 13:56, 24 October 2023

Page text matches

  • protocol. ...support for web services via the [[Simple Object Access Protocol]] (SOAP) protocol,
    541 bytes (81 words) - 14:40, 11 November 2004
  • Optimized Link State Routing Protocol
    37 bytes (5 words) - 10:27, 4 November 2004
  • No. Time Source Destination Protocol Length Info No. Time Source Destination Protocol Length Info
    28 KB (3,072 words) - 15:09, 30 June 2015
  • == 5. Multi-Channel Routing Protocol==
    882 bytes (132 words) - 20:29, 17 October 2006
  • * Voice over Internet Protocol (VoIP) communication requires some kind of quality of service. Latency and ** RFC 3261 (Session Initiation Protocol, SIP)
    2 KB (311 words) - 08:51, 23 April 2006
  • *[[Query Routing Protocol]]
    613 bytes (84 words) - 10:31, 17 May 2006
  • * [[PROPHET| PROPHET - Probabilistic Routing Protocol using History of Encounters and Transitivity ]]
    404 bytes (47 words) - 06:15, 19 July 2006
  • The protocol serves as a distributed object protocol such as RMI or CORBA-IIOP. Thus, whereas RMI is based on the Java platform, ...transfer protocols, programming language and platform, WSDL promises to be protocol agnostic. Though wsdl files are normally generated automatically by tools s
    5 KB (753 words) - 00:09, 25 January 2005
  • Network coding is an experimental protocol for delay tolerant networks. networks. Furthermore the network coding protocol (NCP) reduces the total
    3 KB (432 words) - 08:59, 20 October 2006
  • The Implementation of this routing protocol needs some requirements. First the standard MAC Protocol has to be modified. And in second every node needs a Delivery-Ratio-Matrix
    6 KB (939 words) - 20:46, 31 July 2007
  • # adb protocol on passion (Nexus One) # fastboot protocol on passion (Nexus One)
    7 KB (849 words) - 08:27, 25 October 2012
  • ...hatsApp, and more. In this article, I'll focus on X3DH. Unfortunately, the protocol is not post-quantum secure (PQ-secure), which can be attributed to its heav =Properties of the Signal Protocol=
    13 KB (1,927 words) - 13:56, 24 October 2023
  • = High-Level Protocol Design = The proposed high-level protocol we use is devided into 3 phases: In the first phase (Low-Level Connectivity
    9 KB (1,523 words) - 14:38, 17 November 2005
  • The server<->client protocol, or the sessions, should provide protection against: ...numbers, but add next to no additional value. Also: SSL is quite a complex protocol and widely deployed implementation errors (ASN.1!) have not been unheard of
    15 KB (2,062 words) - 04:25, 19 June 2006
  • So the logical consequence is to develop a routing protocol on the network layer level that can utilize multiple channels. For the development of the protocol a very practical set of assumptions is used, which is supported by almost e
    14 KB (2,372 words) - 13:42, 23 July 2006
  • An '''Ad hoc protocol''' is a convention or standard that controls or enables the connection, com ...an '''ad hoc protocol''' can also mean an improvised and often impromptu [[protocol]] established for a particular specific purpose.
    22 KB (3,017 words) - 17:38, 2 June 2010
  • == 1.Internet Relay Chat (IRC) Protocol (RFC 1459) == SIP steht für Session Initiation Protocol und wird im RFC 3261 beschrieben. Dabei wurden auf folgende Dinge geachtet:
    12 KB (1,808 words) - 15:06, 18 March 2006
  • OSPR (Open Shortest Path First) is an interior gateway protocol which uses the link state algorithm to compute the routing table. It is one == Routing Information Protocol ==
    11 KB (1,729 words) - 16:35, 30 July 2007
  • No. Time Source Destination Protocol Length Info No. Time Source Destination Protocol Length Info
    21 KB (1,644 words) - 13:06, 7 October 2014
  • ...ween the Anonymization Layer and the Reputation System a simple line based protocol is used. The Reputation System acts as a TCP server and listens on 127.0.0.
    2 KB (393 words) - 18:46, 25 May 2006
  • BitTorrent is a Peer2Peer filesharing protocol. It was designed in 2001 by Bram Cohen, to replace centralized server struc ...pulated, to take advantage of three different weaknesses in the BitTorrent protocol. These weaknesses are explained in the following section.
    4 KB (680 words) - 14:41, 19 July 2007
  • === Validation Protocol ===
    8 KB (740 words) - 15:12, 27 April 2012
  • * Simulates standard 802.11 PSM protocol, or the Bounded Slowdown (BSD) protocol
    3 KB (471 words) - 07:43, 5 June 2007
  • ...ulates the cost of transmission power as well as the operation of the PARO protocol. ===Protocol Operations ===
    9 KB (1,431 words) - 14:39, 8 February 2005
  • ...hallenging problems in the link, network, and higher layers of the network protocol stack. On the other hand, the lack of wired infrastructure and their topolo
    2 KB (236 words) - 15:23, 5 August 2007
  • ...hrichten in der richtigen Reihenfolge ankommen (siehe auch [[Query Routing Protocol]])<br>
    4 KB (541 words) - 14:11, 5 February 2006
  • * [[Routing Protocol Performance]]
    2 KB (265 words) - 20:02, 13 April 2005
  • ...estigate Multi-Channel Extremely Opportunistic Routing (MCExOR) which is a protocol that extends Extremely Opportunistic Routing by utilizing multiple RF chann * Jungmin So and Nitin Vaidya. A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Singl
    4 KB (532 words) - 18:33, 9 November 2006
  • ...the advantages of these characteristics, to create a more powerful routing protocol for MANETs. == Protocol details ==
    10 KB (1,685 words) - 20:33, 14 December 2012
  • ''HTTP'' is a widely used application-level protocol in the web and was used since 1990. So far three versions exist: ''HTTP/1.0 ...crypted traffic is specified, all major browsers only implement the ''h2'' protocol part . Thus encrypted traffic is the ''de facto'' standard when using ''HTT
    9 KB (1,370 words) - 11:36, 5 March 2019
  • ...trol and considerable overhead. Still, TCP is the standard transport layer protocol, and many applications are based on it, including the MiniSEED software use === EDIM Routing Protocol ===
    9 KB (1,371 words) - 23:21, 30 August 2008
  • Each node buffers 50 packets. The protocol buffers additional 50 packets.
    2 KB (340 words) - 11:41, 4 November 2004
  • * An out-of-date node receives the new software via Trivial File Transfer Protocol (TFTP) from its neighbor. * notification and update protocol never changes after 1.0.0 is released
    7 KB (1,053 words) - 18:39, 9 November 2006
  • correct Protocol behavior.
    2 KB (324 words) - 14:18, 19 June 2007
  • ...Querys zu verhindern, wurde bei der neuen Version (v0.6) das Query Routing Protocol implementiert.<br>
    2 KB (292 words) - 14:52, 5 February 2006
  • ...appropriate. Alternatively, a plaintext password can also be used if CHAP protocol is being used, CHAP usage is strongly discouraged for security reasons.
    2 KB (378 words) - 13:52, 10 April 2005
  • ...appropriate. Alternatively, a plaintext password can also be used if CHAP protocol is being used, CHAP usage is strongly discouraged for security reasons.
    2 KB (378 words) - 13:53, 10 April 2005
  • ===== Application Server Setup Protocol ===== ===== Client Authentication Protocol =====
    17 KB (2,561 words) - 10:45, 19 October 2006
  • ...of mobile ad hoc network routing protocols, an implementation of BSDs ARP protocol, an 802.11 MAC Layer, a radio propagation model and mechanisms to model nod ...he [[RoutingProtocols|Dynamic Source Routing]] (DSR) protocol and BSDs ARP protocol (used to resolve IP adresses to MAC adresses)
    15 KB (2,548 words) - 13:02, 3 February 2005
  • ...it has to know the hardware address of the communication partner. The ARP protocol is used to discover hardware addresses for given internet addresses. So if ...ker is able to extract the first 16 bytes of the key stream. Since the ARP protocol has no protection against re-injection an attacker can write a captured ARP
    11 KB (1,784 words) - 12:30, 28 June 2007
  • *SNEP: The sensor network encryption protocol, which provides secure point-to-point communication. This protocol provides data confidentiality, two-party data authentication, integrity, fr
    13 KB (2,182 words) - 10:39, 22 February 2005
  • response protocol), presentation of the private key, or on an A standard tool for secure remote access, the SSH protocol uses public key
    10 KB (1,517 words) - 21:27, 15 February 2005
  • ...ttp://www.crhc.uiuc.edu/wireless/papers/multichannel_routing.pdf A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Singl ...er show that, in terms of packet delivery ratio, AIR is also a competitive protocol compared with such reactive protocols as Ad hoc On Demand Distance Vector (
    17 KB (2,363 words) - 11:54, 12 July 2005
  • // input[0] - ethernet (802.3) frames from external nodes (no BRN protocol) ...0]output - ethernet (802.3) frames to external nodes/clients or me (no BRN protocol)
    15 KB (1,599 words) - 09:25, 25 January 2006
  • // input[0] - ethernet (802.3) frames from external nodes (no BRN protocol) ...0]output - ethernet (802.3) frames to external nodes/clients or me (no BRN protocol)
    15 KB (1,599 words) - 09:26, 25 January 2006
  • === Protocol Parameter Selection (PPS) === *'''PCB''' (Protocol Control Byte) codiert Blocktyp und benötigte Informationen (z.B. Sendefolg
    9 KB (1,281 words) - 11:25, 28 November 2012
  • // input[0] - ethernet (802.3) frames from external nodes (no BRN protocol) ...0]output - ethernet (802.3) frames to external nodes/clients or me (no BRN protocol)
    15 KB (1,647 words) - 09:20, 25 January 2006
  • // input[0] - ethernet (802.3) frames from external nodes (no BRN protocol) ...0]output - ethernet (802.3) frames to external nodes/clients or me (no BRN protocol)
    15 KB (1,650 words) - 09:22, 25 January 2006
  • // input[0] - ethernet (802.3) frames from external nodes (no BRN protocol) ...0]output - ethernet (802.3) frames to external nodes/clients or me (no BRN protocol)
    15 KB (1,658 words) - 09:24, 25 January 2006
  • ...n Schlüsselaustauschs. Dieses Problem wird bei SSL durch das SSL Handshake Protocol gelöst. == Das SSL Record Protocol ==
    15 KB (2,226 words) - 09:58, 12 August 2007
  • ...ige Protokolle sind das Artifact Resolution Protocol und das Single Logout Protocol. Durch SAML-Bindings wird der Transport der Nachrichten selbst organisiert, ...ken, da die meisten Probleme während der Kommunikation im Request/Response Protocol auftauchen. Der Empfänger muss natürlich jegliche Gültigkeitsintervalle
    12 KB (1,606 words) - 11:59, 12 April 2010
  • ...<br />Please bear in mind that this capacity needs to include all kinds of protocol overhead (e.g. MAC, IP, TCP or UDP etc.) and would also be subjected to oth ...h in turn causes routing queries (bursty traffic) depending on the routing protocol. This again causes congestion. Finally, the result will not just be some dr
    9 KB (1,571 words) - 11:02, 8 February 2005
  • ...ess Local Area Network standard evolved in 1997 in form of the IEEE 802.11 Protocol. <br>
    3 KB (465 words) - 13:34, 10 February 2005
  • ...least one special '''gateway''' node, translating between the region's own protocol and DTN-speak and resolving global (R,L)-style DTN names into local, region
    4 KB (650 words) - 16:18, 18 July 2006
  • === Authentication Request Protocol === Das Authentication Request Protocol wird verwendet, um Assertions über den Benutzer vom Identity Provider zu e
    23 KB (3,104 words) - 10:30, 22 October 2018
  • =Lab 3: Address Resolution Protocol (ARP)= (Data-Link-Protocol) abzubilden. Hierbei wird in aller Regel eine Anfrage mit Hilfe eines Broad
    8 KB (1,043 words) - 08:18, 12 April 2006
  • A zero knowledge proof is a cartographic protocol that enables one party to to prove to another party that they know a value The Dragonfly handshake is essentially a SPEKE protocol. SPEKE stands for Simple Password Exponential Key Exchange.
    32 KB (5,152 words) - 16:11, 20 November 2018
  • ...GulMOkYOQm-fIQhhkd2VDr9578oh0KOwcEw/edit#heading=h.q5kqrl82hzpj Google U2F Protocol and API Details] ...s.google.com/document/d/12AdwNDIhs6blXGTCOReaUGviBqCtsVrGMtrxGeCCxPU/edit# Protocol Design + User Flows]
    8 KB (1,147 words) - 15:15, 30 June 2015
  • ...on demand prior to sending data (which is slow). Also, a proactive routing protocol could also not only flood link state information but also other information * based on a proactive routing protocol (allows world view, but maybe partly view is sufficient)
    10 KB (1,523 words) - 08:57, 28 July 2007
  • a file system based protocol which is published by NFS? The architecture can be service
    5 KB (839 words) - 11:51, 13 April 2007
  • *** <resource-ref>: JNDI ENC name, interface type and protocol for authorisation (e.g. name=jms/TopicFactroy, type=javax.jms.TopicConnecti
    5 KB (555 words) - 12:45, 14 February 2005
  • ...te weitergegeben werden. Ein solches Datenpaket heißt <b>APDU (Application Protocol Data Unit)</b>. Im Epilog schließlich findet sich eine Prüfsumme, anhand ...ting Time (s.u.) anzufragen. Die Unterscheidung dieser Blöcke findet im <b>Protocol Control Byte (PCB)</b> im Prolog statt.
    26 KB (3,637 words) - 17:18, 20 October 2016
  • PPTP is best described in RFC 2637. In short, PPTP is used to tunnel the PPP-protocol over IP-networks. It is realized with a Client-Server architecture and work
    4 KB (686 words) - 13:49, 14 September 2005
  • ...ationen wie [[Flow Control]], [[Ping Pong Schema]] und das [[Query Routing Protocol]] verwendet. <br>
    4 KB (607 words) - 13:35, 14 February 2006
  • -#define DOWNLOAD_PROTO_TFTP /* Trivial File Transfer Protocol */ +#undef DOWNLOAD_PROTO_TFTP /* Trivial File Transfer Protocol */
    19 KB (2,691 words) - 12:34, 15 November 2019
  • ===Address Resolution Protocol (ARP) for Brn=== ===Dynamic Host Configuration Protocol (DHCP) for Brn===
    25 KB (3,756 words) - 13:52, 23 August 2006
  • "An open protocol to allow secure API authorization in a simple and standard method from desk
    5 KB (621 words) - 13:44, 16 August 2010
  • ...To understand this approach, we'll have to look at the Address Resolution Protocol itself.
    6 KB (1,001 words) - 19:41, 13 December 2004
  • das SOAP (Simple Object Access Protocol) übertragen. Diese SOAP-Messages werden über das im Internet verbreitete
    6 KB (756 words) - 21:54, 16 June 2010
  • ...rade auf alter Hardware installiert werden kann, das Tempory Key Integrity Protocol - '''TKIP'''. * AES-CCMP / CCM - AES in Counter Mode with Cipher Block Chaining Protocol, Mode used by WPA2
    15 KB (2,234 words) - 10:04, 23 July 2007
  • ...bindung in einem Telefonnetz übertragen werden, sondern durch das Internet Protocol in Datenpakete aufgeteilt, auf nicht festgelegten Wegen in einem Netzwerk z Session Initiation Protocol (SIP)
    20 KB (2,799 words) - 18:01, 10 July 2005
  • ...examines one, if not set. Another solution might use a Inter Access Point Protocol instead of DHT to examine, what gateway the client is using. But to overcom
    6 KB (1,036 words) - 09:40, 27 March 2006
  • * [https://tools.ietf.org/html/rfc4035 RFC4035 Protocol Modifications for the DNS Security Extensions] ...sed Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA]
    14 KB (2,094 words) - 20:11, 22 October 2015
  • ...Kerberos_%28protocol%29 Kerberos], which is build on the Needham-Schroeder protocol. ...in constraints on data, like consistency, as well as from different access protocol problems, e.g. deadlocks. Usually protocols are designed to solve these pro
    20 KB (3,188 words) - 11:59, 4 January 2005
  • *** Secure and anonymous protocol for Trustmanagement. Uses public key cryptography mechanisms. Each peer has
    7 KB (1,070 words) - 10:52, 7 May 2006
  • ...andles the method invocation and transforms the RPC call into an XML based protocol, such as SOAP.
    10 KB (1,458 words) - 13:29, 9 February 2005
  • ...IP traffic causes a lot more DNS packets to be sent than normal use of the protocol. Also, because as much data as possible is crammed into every single packet ...tive portal is basically a '''man in the middle''' attack. They use a HTTP protocol vulnerability to redirect users to their pages. Technically, they were neve
    15 KB (2,455 words) - 13:54, 12 October 2017
  • ...urch Erhalt von nötigen Informationen eines Tunnel Information and Control Protocol (TIC) Servers konfigurieren. ...erbei manuell eingerichtet oder über automatische Protokolle (Tunnel Setup Protocol) um sich zu einem Tunnel Broker zu verbinden.
    40 KB (5,340 words) - 11:00, 8 October 2011
  • ...for several attacks. In order to make it harder to forge information, the protocol currently implemented exchanges the positions of the nodes and all their pe
    20 KB (3,255 words) - 11:59, 14 October 2007
  • TCP ist die Abkürzung für ''Transmission Transport Protocol'' und stellt im TCP/IP-Stack die Transportschicht dar. Damit stellt TCP Die
    7 KB (994 words) - 18:15, 15 July 2007
  • Das von WireGuard verwendete Protokoll wurde auf Basis des Noise Protocol Framework entworfen und zeichnet sich durch die Verwendung statischer Heade * [http://noiseprotocol.org/noise.pdf Noise Protocol Framework]
    16 KB (2,215 words) - 09:39, 22 October 2018
  • ...1.2-ps-20170411/fido-u2f-hid-protocol-v1.2-ps-20170411.html ''FIDO U2F HID Protocol Specification'']</ref> ...2f-v1.2-ps-20170411/fido-u2f-nfc-protocol-v1.2-ps-20170411.html ''FIDO NFC Protocol Specification v1.0'']</ref>
    17 KB (2,498 words) - 11:50, 30 April 2018
  • ...ollpunkt erhält über diese Multicast-Nachrichten (Simple Service Discovery Protocol) Information darüber, um was für ein Gerät es sich handelt (z.B. Interne ...two clients are behind the same NAT. Remember the restrictions to the STUN protocol: the clients may find out they are behind the same NAT, but they actually d
    31 KB (4,717 words) - 10:15, 16 March 2006
  • ...45-16:15 || '''[[ W2023-ITS#Signal_Protocol_Post_Quantum_Security | Signal Protocol Post Quantum Security ]]''' || Emily || [[Media:PQSIG_Folien.pdf | pdf]] ...nt/uploads/2014/07/GPC_2.3_D_SCP03_v1.1.2_PublicRelease.pdf Secure Channel Protocol '03']
    37 KB (5,147 words) - 09:40, 5 December 2023
  • ...hat die Möglichkeit durch ''Visible Resource Revocation'' und ein ''Abort Protocol'' ...''x'') er freigeben möchte ist dem Prozess selbst überlassen. Das '''Abort Protocol''' ist die letzte Maßnahme des Kernels, um Ressourcen wieder zu erhalten,
    18 KB (2,564 words) - 19:46, 18 April 2007
  • | 802.11F || Inter-access point protocol to improve roaming between directly attached access points. ...802.11 for use in automobiles. The initial use is likely to be a standard protocol used to collect tolls.
    38 KB (4,956 words) - 19:06, 19 October 2006
  • ...rs/karger-subgroup.pdf David R. Karger, Matthias Ruhl, Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks (pdf)], Seite * [http://iptps04.cs.ucsd.edu/papers/karger-subgroup.pdf Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks (pdf)]
    24 KB (3,604 words) - 19:39, 28 January 2013
  • :Dem ganzen liegt das BitTorrent-Protocol zu Grunde und wird durch das "Cooperative Download"-Modul in seiner Perform
    10 KB (1,386 words) - 16:13, 15 July 2007
  • ...yptografisch modern und Sicher durch Verwendung moderner Primitiven (Noise protocol framework, Curve25519, ChaCha20, Poly1305, BLAKE2, SipHash24, HKDF ...) ...s://noiseprotocol.org/noise.html#overview-of-handshake-state-machine Noise Protocol Framework]
    25 KB (3,461 words) - 10:03, 5 March 2019
  • EAP steht für Extensible Authentication Protocol ([https://datatracker.ietf.org/doc/html/rfc3748 RFC3748]) und ist ein allge RADIUS uses User Datagram Protocol (UDP) port 1812 for authentication and 1813 for
    27 KB (3,746 words) - 13:59, 8 November 2022
  • ...rfcmarkup/5246#section-7.4.6 RFC 5246:] The Transport Layer Security (TLS) Protocol Version 1.2
    13 KB (1,886 words) - 22:00, 5 March 2012
  • Job Language (PJL) protocol.
    15 KB (2,085 words) - 07:21, 17 October 2017
  • ** Zum Umgehen von Blacklisten nutzten Spammer ihre dynamic dial up internet protocol-Adressen für die Zuweisung einer neuen IP-Adresse. Gegenmaßnahmen waren a Das Simple Mail Transfer Protocol (SMTP) ist das Standardprotokoll zum Austausch von E-Mails in Computernetze
    45 KB (6,424 words) - 12:56, 14 November 2018
  • ...rd das Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) verwendet. ...P ausgetauscht. Der Handshake verwendet dazu das Extensible Authentication Protocol over Lan (EAPOL).
    44 KB (5,774 words) - 11:30, 15 October 2018
  • ** the refresh rate is a protocol design parameter that trades off overhead for increased robustness to lost
    22 KB (3,370 words) - 12:00, 29 January 2005
  • ...e jeweilige Generierung des ''SK<sub>AB</sub>'' ist das sog. key-agreement-protocol zuständig, das direkt nach Verbindungsaufbau abgearbeitet wird.
    15 KB (2,258 words) - 13:12, 5 January 2011
  • #define U2FHID_SYNC (TYPE_INIT | 0x3c) /** Protocol resync command 0xbc*/
    17 KB (2,071 words) - 15:17, 30 June 2015
  • ** DNSSEC Protocol RFC (RFC 4035)
    16 KB (2,241 words) - 09:44, 4 August 2012
  • ...ackoverflow.com/questions/30550899/what-is-the-structure-of-an-application-protocol-data-unit-apdu-command-and-re/30679558#30679558]. Vor jeder Operation wird
    24 KB (3,147 words) - 13:27, 8 November 2022
  • * '''OCSP''' - Online Certificate Status Protocol (Echtzeit, geringerer Bandbreitenverbrauch)
    25 KB (3,417 words) - 14:37, 3 December 2023