PDF Archive search engine
Last database update: 10 December at 21:29 - Around 220000 files indexed.
Results for «protocols»:
Total: 700 results - 0.031 seconds
The requested files and other content which are requested online via the server are processed and delivered to the internet user by way of a collection of rules known in the industry as protocols.
Unlike other digital currency protocols, however, the Ripple Protocol is currency agnostic and users are not required to transact in the Protocol’s native currency (XRP).
With a combination of hardware, software, and voice protocols, your session is transmitted over the IP network to the intended destination.
The main classes of routing protocols are Proactive, Reactive and Hybrid.
We present the construction of a security tag that allows to protect the anonymity of honest users and to revoke anonymity only in case of cheat for protocols based on a binary tree structure without using a trusted third party.
There are protocols that are different and this particular protocol used within the Internet world is currently referred to as the IP (Internet Protocol) for the adaptive and rapid communication between devices.
Its design principles are also representative of a large class of synchronization protocols based on message exchanges between the synchronizing nodes.
Socks protocols are utilized within this technology when a socks server requests along with retargets your data that's delivered back.
A Survey of Protocol-Level Challenges and Solutions for Distributed Energy Resource Cyber-Physical Security 89%
protocols; SCADA; standards; enforcement; challenges;
it requires one of the two protocols to complete the process which includes IMAP and POP3.