Search results

Jump to navigation Jump to search

Page title matches

  • ...Querys zu verhindern, wurde bei der neuen Version (v0.6) das Query Routing Protocol implementiert.<br>
    2 KB (292 words) - 14:52, 5 February 2006
  • Each node buffers 50 packets. The protocol buffers additional 50 packets.
    2 KB (340 words) - 11:41, 4 November 2004
  • The server<->client protocol, or the sessions, should provide protection against: ...numbers, but add next to no additional value. Also: SSL is quite a complex protocol and widely deployed implementation errors (ASN.1!) have not been unheard of
    15 KB (2,062 words) - 04:25, 19 June 2006
  • ...ween the Anonymization Layer and the Reputation System a simple line based protocol is used. The Reputation System acts as a TCP server and listens on 127.0.0.
    2 KB (393 words) - 18:46, 25 May 2006
  • ...hatsApp, and more. In this article, I'll focus on X3DH. Unfortunately, the protocol is not post-quantum secure (PQ-secure), which can be attributed to its heav =Properties of the Signal Protocol=
    13 KB (1,927 words) - 13:56, 24 October 2023

Page text matches

  • protocol. ...support for web services via the [[Simple Object Access Protocol]] (SOAP) protocol,
    541 bytes (81 words) - 14:40, 11 November 2004
  • Optimized Link State Routing Protocol
    37 bytes (5 words) - 10:27, 4 November 2004
  • No. Time Source Destination Protocol Length Info No. Time Source Destination Protocol Length Info
    28 KB (3,072 words) - 15:09, 30 June 2015
  • == 5. Multi-Channel Routing Protocol==
    882 bytes (132 words) - 20:29, 17 October 2006
  • * Voice over Internet Protocol (VoIP) communication requires some kind of quality of service. Latency and ** RFC 3261 (Session Initiation Protocol, SIP)
    2 KB (311 words) - 08:51, 23 April 2006
  • *[[Query Routing Protocol]]
    613 bytes (84 words) - 10:31, 17 May 2006
  • * [[PROPHET| PROPHET - Probabilistic Routing Protocol using History of Encounters and Transitivity ]]
    404 bytes (47 words) - 06:15, 19 July 2006
  • The protocol serves as a distributed object protocol such as RMI or CORBA-IIOP. Thus, whereas RMI is based on the Java platform, ...transfer protocols, programming language and platform, WSDL promises to be protocol agnostic. Though wsdl files are normally generated automatically by tools s
    5 KB (753 words) - 00:09, 25 January 2005
  • Network coding is an experimental protocol for delay tolerant networks. networks. Furthermore the network coding protocol (NCP) reduces the total
    3 KB (432 words) - 08:59, 20 October 2006
  • The Implementation of this routing protocol needs some requirements. First the standard MAC Protocol has to be modified. And in second every node needs a Delivery-Ratio-Matrix
    6 KB (939 words) - 20:46, 31 July 2007
  • # adb protocol on passion (Nexus One) # fastboot protocol on passion (Nexus One)
    7 KB (849 words) - 08:27, 25 October 2012
  • ...hatsApp, and more. In this article, I'll focus on X3DH. Unfortunately, the protocol is not post-quantum secure (PQ-secure), which can be attributed to its heav =Properties of the Signal Protocol=
    13 KB (1,927 words) - 13:56, 24 October 2023
  • = High-Level Protocol Design = The proposed high-level protocol we use is devided into 3 phases: In the first phase (Low-Level Connectivity
    9 KB (1,523 words) - 14:38, 17 November 2005
  • The server<->client protocol, or the sessions, should provide protection against: ...numbers, but add next to no additional value. Also: SSL is quite a complex protocol and widely deployed implementation errors (ASN.1!) have not been unheard of
    15 KB (2,062 words) - 04:25, 19 June 2006
  • So the logical consequence is to develop a routing protocol on the network layer level that can utilize multiple channels. For the development of the protocol a very practical set of assumptions is used, which is supported by almost e
    14 KB (2,372 words) - 13:42, 23 July 2006
  • An '''Ad hoc protocol''' is a convention or standard that controls or enables the connection, com ...an '''ad hoc protocol''' can also mean an improvised and often impromptu [[protocol]] established for a particular specific purpose.
    22 KB (3,017 words) - 17:38, 2 June 2010
  • == 1.Internet Relay Chat (IRC) Protocol (RFC 1459) == SIP steht für Session Initiation Protocol und wird im RFC 3261 beschrieben. Dabei wurden auf folgende Dinge geachtet:
    12 KB (1,808 words) - 15:06, 18 March 2006
  • OSPR (Open Shortest Path First) is an interior gateway protocol which uses the link state algorithm to compute the routing table. It is one == Routing Information Protocol ==
    11 KB (1,729 words) - 16:35, 30 July 2007
  • No. Time Source Destination Protocol Length Info No. Time Source Destination Protocol Length Info
    21 KB (1,644 words) - 13:06, 7 October 2014
  • ...ween the Anonymization Layer and the Reputation System a simple line based protocol is used. The Reputation System acts as a TCP server and listens on 127.0.0.
    2 KB (393 words) - 18:46, 25 May 2006
  • BitTorrent is a Peer2Peer filesharing protocol. It was designed in 2001 by Bram Cohen, to replace centralized server struc ...pulated, to take advantage of three different weaknesses in the BitTorrent protocol. These weaknesses are explained in the following section.
    4 KB (680 words) - 14:41, 19 July 2007
  • === Validation Protocol ===
    8 KB (740 words) - 15:12, 27 April 2012
  • * Simulates standard 802.11 PSM protocol, or the Bounded Slowdown (BSD) protocol
    3 KB (471 words) - 07:43, 5 June 2007
  • ...ulates the cost of transmission power as well as the operation of the PARO protocol. ===Protocol Operations ===
    9 KB (1,431 words) - 14:39, 8 February 2005
  • ...hallenging problems in the link, network, and higher layers of the network protocol stack. On the other hand, the lack of wired infrastructure and their topolo
    2 KB (236 words) - 15:23, 5 August 2007
  • ...hrichten in der richtigen Reihenfolge ankommen (siehe auch [[Query Routing Protocol]])<br>
    4 KB (541 words) - 14:11, 5 February 2006
  • * [[Routing Protocol Performance]]
    2 KB (265 words) - 20:02, 13 April 2005
  • ...estigate Multi-Channel Extremely Opportunistic Routing (MCExOR) which is a protocol that extends Extremely Opportunistic Routing by utilizing multiple RF chann * Jungmin So and Nitin Vaidya. A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Singl
    4 KB (532 words) - 18:33, 9 November 2006
  • ...the advantages of these characteristics, to create a more powerful routing protocol for MANETs. == Protocol details ==
    10 KB (1,685 words) - 20:33, 14 December 2012
  • ''HTTP'' is a widely used application-level protocol in the web and was used since 1990. So far three versions exist: ''HTTP/1.0 ...crypted traffic is specified, all major browsers only implement the ''h2'' protocol part . Thus encrypted traffic is the ''de facto'' standard when using ''HTT
    9 KB (1,370 words) - 11:36, 5 March 2019
  • ...trol and considerable overhead. Still, TCP is the standard transport layer protocol, and many applications are based on it, including the MiniSEED software use === EDIM Routing Protocol ===
    9 KB (1,371 words) - 23:21, 30 August 2008
  • Each node buffers 50 packets. The protocol buffers additional 50 packets.
    2 KB (340 words) - 11:41, 4 November 2004
  • * An out-of-date node receives the new software via Trivial File Transfer Protocol (TFTP) from its neighbor. * notification and update protocol never changes after 1.0.0 is released
    7 KB (1,053 words) - 18:39, 9 November 2006
  • correct Protocol behavior.
    2 KB (324 words) - 14:18, 19 June 2007
  • ...Querys zu verhindern, wurde bei der neuen Version (v0.6) das Query Routing Protocol implementiert.<br>
    2 KB (292 words) - 14:52, 5 February 2006
  • ...appropriate. Alternatively, a plaintext password can also be used if CHAP protocol is being used, CHAP usage is strongly discouraged for security reasons.
    2 KB (378 words) - 13:52, 10 April 2005
  • ...appropriate. Alternatively, a plaintext password can also be used if CHAP protocol is being used, CHAP usage is strongly discouraged for security reasons.
    2 KB (378 words) - 13:53, 10 April 2005
  • ===== Application Server Setup Protocol ===== ===== Client Authentication Protocol =====
    17 KB (2,561 words) - 10:45, 19 October 2006
  • ...of mobile ad hoc network routing protocols, an implementation of BSDs ARP protocol, an 802.11 MAC Layer, a radio propagation model and mechanisms to model nod ...he [[RoutingProtocols|Dynamic Source Routing]] (DSR) protocol and BSDs ARP protocol (used to resolve IP adresses to MAC adresses)
    15 KB (2,548 words) - 13:02, 3 February 2005
  • ...it has to know the hardware address of the communication partner. The ARP protocol is used to discover hardware addresses for given internet addresses. So if ...ker is able to extract the first 16 bytes of the key stream. Since the ARP protocol has no protection against re-injection an attacker can write a captured ARP
    11 KB (1,784 words) - 12:30, 28 June 2007
  • *SNEP: The sensor network encryption protocol, which provides secure point-to-point communication. This protocol provides data confidentiality, two-party data authentication, integrity, fr
    13 KB (2,182 words) - 10:39, 22 February 2005
  • response protocol), presentation of the private key, or on an A standard tool for secure remote access, the SSH protocol uses public key
    10 KB (1,517 words) - 21:27, 15 February 2005
  • ...ttp://www.crhc.uiuc.edu/wireless/papers/multichannel_routing.pdf A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Singl ...er show that, in terms of packet delivery ratio, AIR is also a competitive protocol compared with such reactive protocols as Ad hoc On Demand Distance Vector (
    17 KB (2,363 words) - 11:54, 12 July 2005
  • // input[0] - ethernet (802.3) frames from external nodes (no BRN protocol) ...0]output - ethernet (802.3) frames to external nodes/clients or me (no BRN protocol)
    15 KB (1,599 words) - 09:26, 25 January 2006
  • // input[0] - ethernet (802.3) frames from external nodes (no BRN protocol) ...0]output - ethernet (802.3) frames to external nodes/clients or me (no BRN protocol)
    15 KB (1,599 words) - 09:25, 25 January 2006
  • === Protocol Parameter Selection (PPS) === *'''PCB''' (Protocol Control Byte) codiert Blocktyp und benötigte Informationen (z.B. Sendefolg
    9 KB (1,281 words) - 11:25, 28 November 2012
  • // input[0] - ethernet (802.3) frames from external nodes (no BRN protocol) ...0]output - ethernet (802.3) frames to external nodes/clients or me (no BRN protocol)
    15 KB (1,647 words) - 09:20, 25 January 2006
  • // input[0] - ethernet (802.3) frames from external nodes (no BRN protocol) ...0]output - ethernet (802.3) frames to external nodes/clients or me (no BRN protocol)
    15 KB (1,650 words) - 09:22, 25 January 2006
  • // input[0] - ethernet (802.3) frames from external nodes (no BRN protocol) ...0]output - ethernet (802.3) frames to external nodes/clients or me (no BRN protocol)
    15 KB (1,658 words) - 09:24, 25 January 2006
  • ...n Schlüsselaustauschs. Dieses Problem wird bei SSL durch das SSL Handshake Protocol gelöst. == Das SSL Record Protocol ==
    15 KB (2,226 words) - 09:58, 12 August 2007
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)