Academic literature on the topic 'Reconfigurable transport layer protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Reconfigurable transport layer protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Reconfigurable transport layer protocol"

1

AdeebAbdulJabbar, Mohammed, Ali Makki Sagheer, and Ayoob Abdulmonem Abdulhameed. "Transport Layer Security Protocol for Intranet." International Journal of Computer Applications 81, no. 1 (November 15, 2013): 22–26. http://dx.doi.org/10.5120/13976-1971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kushwah, Deepika Singh, Mahesh Kumar, and Lal Pratap Verma. "Analyzing Reliable Transport Layer Protocol Performance." Journal of Physics: Conference Series 1714 (January 2021): 012040. http://dx.doi.org/10.1088/1742-6596/1714/1/012040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Voydock, Victor L., and Stephen T. Kent. "Security mechanisms in a transport layer protocol." Computers & Security 4, no. 4 (December 1985): 325–41. http://dx.doi.org/10.1016/0167-4048(85)90051-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ahuja, Sanjay P., and W. Russell Shore. "Wireless Transport Layer Congestion Control Evaluation." International Journal of Wireless Networks and Broadband Technologies 1, no. 3 (July 2011): 71–81. http://dx.doi.org/10.4018/ijwnbt.2011070105.

Full text
Abstract:
The performance of transport layer protocols can be affected differently due to wireless congestion, as opposed to network congestion. Using an active network evaluation strategy in a real world test-bed experiment, the Transport Control Protocol (TCP), Datagram Congestion Control Protocol (DCCP), and Stream Control Transport Protocol (SCTP) were evaluated to determine their effectiveness in terms of throughput, fairness, and smoothness. Though TCP’s fairness was shown to suffer in wireless congestion, the results showed that it still outperforms the alternative protocols in both wireless congestion, and network congestion. In terms of smoothness, the TCP-like congestion control algorithm of DCCP did outperform TCP in wireless congestion, but at the expense of throughput and ensuing fairness. SCTP’s congestion control algorithm was also found to provide better smoothness in wireless congestion. In fact, it provided smoother throughput performance than in the network congestion.
APA, Harvard, Vancouver, ISO, and other styles
5

Zheng, Kai. "Enabling “Protocol Routing”: Revisiting Transport Layer Protocol Design in Internet Communications." IEEE Internet Computing 21, no. 6 (November 2017): 52–57. http://dx.doi.org/10.1109/mic.2017.4180845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Johansson, S. "Transport network involving a reconfigurable WDM network layer-a European demonstration." Journal of Lightwave Technology 14, no. 6 (June 1996): 1341–48. http://dx.doi.org/10.1109/50.511665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Zheng, Yi Sun, Jiankang Wu, and Shiwei Ye. "Robust Multi-Path Zone Routing Protocol for Video Transport Over Reconfigurable Wireless Networks." Journal of Signal Processing Systems 51, no. 2 (August 16, 2007): 183–94. http://dx.doi.org/10.1007/s11265-007-0106-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

C.Shah, Jaimin, Kaushika Patel, Sameer D. Trapasiya, and J. M. Rathod J.M.Rathod. "Study for Implementation of VANET with Transport Layer Protocol." International Journal of Computer Applications 89, no. 19 (March 26, 2014): 15–20. http://dx.doi.org/10.5120/15739-4687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

ELBrak, Mohamed, Said EL Brak, and Mohamed Essaaidi. "An Innovative Transport Layer Protocol for Smart Grid Communications." International Journal of Computer Applications 96, no. 15 (June 18, 2014): 37–42. http://dx.doi.org/10.5120/16872-6770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

., Ashwini D. Karanjawane. "TRANSPORT LAYER PROTOCOL FOR URGENT DATA TRANSMISSION IN WSN." International Journal of Research in Engineering and Technology 02, no. 11 (November 25, 2013): 81–89. http://dx.doi.org/10.15623/ijret.2013.0211014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Reconfigurable transport layer protocol"

1

Stone, Steven Walter. "A rapidly reconfigurable, application layer, virtual environment network protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA312937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Firing, Tia Helene. "Analysis of the Transport Layer Security protocol." Thesis, Norwegian University of Science and Technology, Department of Mathematical Sciences, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10025.

Full text
Abstract:

In this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these protocols were deemed secure as well. All the security proofs are based on the UC (Universal Composability) security framework.

APA, Harvard, Vancouver, ISO, and other styles
3

Werstén, Bengt. "Implementing the Transport Layer Security Protocol for Embedded Systems." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8767.

Full text
Abstract:

Web servers are increasingly being used in embedded devices as a communication medium. As more systems connect to the Internet, the need for security is increasing. The Transport Layer Protocol (TLS) is the successor of Secure Socket Layer (SSL) and provides security in almost all secure Internet transactions. This thesis aims to investigate if TLS can be adapted to embedded systems without sacrificing much of the system resources available.

A literature study and an implementation of TLS have been performed. The literature study determined resource intense parts of TLS, hardware support as well as export laws applicable to TLS. The different parts of the implementation are evaluated on an ARM7-core to determine the execution times. The results for the symmetric ciphers AES and 3DES are compared when measuring execution times using both software and hardware solutions. The size of the implementation is also measured.

TLS was shown to be able to integrate on embedded systems. Practical issues such as certificates and keys can be solved in different ways to suite the target environment. The largest remaining issue is the execution time for asymmetric algorithms. The results that are provided clearly illustrates that the RSA used for key exchange is very time consuming. Alternative solutions to gain better performance are discussed.

APA, Harvard, Vancouver, ISO, and other styles
4

Langner, Paul. "A robust, efficient physical layer transport protocol for packets." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0018/NQ48347.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Langner, Paul (Paul Allen) Carleton University Dissertation Engineering Electronics. "A Robust, efficient physical layer transport protocol for packets." Ottawa, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Henna Priscilla. "Transport layer protocol design over flow-switched data networks." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/75711.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 135-136).
In this work, we explore transport layer protocol design for an optical flow-switched network. The objective of the protocol design is to guarantee the reliable delivery of data files over an all-optical end-to- end flow-switched network which is modeled as a burst-error channel. We observe that Transport Control Protocol (TCP) is not best suited for Optical Flow-Switching (OFS). Specifically, flow control and fair resource allocation through windowing in TCP are unnecessary in an OFS network. Moreover TCP has poor throughput and delay performance at high transfer rates due to window flow control and window closing with missing or dropped packets. In OFS, flows are scheduled and congestion control is performed by a scheduling algorithm. Thus, we focus on defining a more efficient transport protocol for optical flow-switched networks that is neither a modification of TCP nor derived from TCP. The main contribution of this work is to optimize the throughput and delay performance of OFS using file segmentation and reassembly, forward error-correction (FEC), and frame retransmission. We analyze the throughput and delay performance of four example transport layer protocols: the Simple Transport Protocol (STP), the Simple Transport Protocol with Interleaving (STPI), the Transport Protocol with Framing (TPF) and the Transport Protocol with Framing and Interleaving (TPFI). First, we show that a transport layer protocol without file segmentation and without interleaving and FEC (STP) results in poor throughput and delay performance and is not well suited for OFS. Instead, we found that interleaving across a large file (STPI) results in the best theoretical delay performance, though the large code lengths and interleaver sizes in this scheme will be hard to implement. Also, in the unlikely case that a file experiences an uncorrectable error, STPI requires extra network resources equal to that of an entire transaction for file retransmission and adds to the delay of the transaction significantly. For the above reason, we propose the segmentation of a file into large frames combined with FEC, interleaving, and retransmission of erroneous frames (TPFI) as the protocol of choice for an OFS network. In TPFI, interleaving combined with FEC and frame retransmission allows a file to be segmented into large frames (>100 Mbits). In addition, TPFI also allows for fewer processing and file segmentation and reassembly overhead compared with a transport layer protocol that does not include interleaving and FEC (TPF).
by Henna Priscilla Huang.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
7

Bandaru, Rammohan, and Debashis Barman. "Performance Evaluation of SCTP as a Transport Layer Protocol." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-16003.

Full text
Abstract:
TCP and UDP are the most popular transport protocols used for end-end data transmission. The rapid growth of internet leads to development of many innovative applications in the current environment. Depending on the functionality of these applications, requirements of transport protocols are changing. TCP is known for its problems with Head Of Line blocking (HOL) and SYN attacks which gives reduced performance, and also doesn’t support Multi-Homing. SCTP is another transport layer protocol similar to TCP which provides end-end communication. It has some unique features like support for Multi-homing and multi-streaming. It also protects better from SYN attacks by using four-way hand shake mechanism during association establishment. As an extension to SCTP, CMT-SCTP was proposed to take full advantage of a multi-homed host by doing load sharing over multiple paths. SCTP is believed to be a next generation transport protocol. This thesis gives an overview of the SCTP protocol and its features focusing on analysing and testing of failover mechanisms provided by SCTP in multi-homed host, evaluating the transmission performance of SCTP vs TCP in a real network environment. This report also gives a theoretical analysis on how SCTP can mitigate SYN attacks by using four-way handshake mechanism and the state of art of CMT-SCTP.
APA, Harvard, Vancouver, ISO, and other styles
8

Ladas, Charalampos V. "Transport layer protocol optimisation for narrowband mobile and wireless links." Thesis, University of Sheffield, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Iyengar, Janardhan R. "End-to-end concurrent multipath transfer using transport layer multihoming." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.67 Mb., p. 123, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ewald-Arostegui, Nimbe Leonor. "Transport Control Protocol Optimisation over Wireless Internet: a Cross-Layer Approach." Thesis, University of Leeds, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.487513.

Full text
Abstract:
This thesis presents an analytical model of a cross-layer communication system to enable improvement in the Transport Control Protocol (rCP) over mixed wired and wireless Internet. The focus is on the quantitative performance evaluation of the interactions between TCP and a hybrid Automatic Repeat reQuest protocol (HARQ) in the link layer (LL) with a finite buffer size. TCP evolution is described and a review of the different approaches to im/ r prove its performance is given. A survey of the most relevant TCP analytical proposals is also provided. The operation of a HARQ scheme comprising Forward Error CorreCtion (FEC) convolutional codes and a Selective Repeat (SR) ARQ protocol is analytically charac~erised by a Discrete Time Markov Chain (DTMC). Corruption losses occur in a radio channel and are modelled by a two-state DTMC whilst congestive losses are due to an LL finite buffer size. HARQ performance parameters are computed through the twO-moment approximation of an M/G/K/l analysis. The accuracy and correctness of the HARQ model is assessed as well as its adequacy for multimedia applications. All analytical results are validated through the well known network simulator, ns-2. It is shown that performance improvemen~ is achieved by dynamically selecting optimal HARQ parameters. It is also illustrated that HARQ can provide the required 'QoS as well as reliable transfer to multimedia applications only under certain power' and traffic conditions given that the impact of congestive losses is greater as the transmission quality improves. An existing mathematical representation of TCP Reno is extended in order to model TCP NewReno given its better performance over noisy channels, Continuous Time Markov Chains (CTMC) are used to this end. The NewReno model accuracy is also validated. .A cross-layer TCP-HARQ communication system is developed with these two analytical models. Top down e>.:plicit notification from TCP to HARQ takes place. The advertised TCP state variables are passed to the LL entity which is able to predict NewReno performance and select the optimal HARQ ,. values. These predictions are computed through fixed-point approximations. The joint TCP-HARQ analytical model is validated and its correctness is demonstrated as well as its capacity to provide a significant TCP performance improvement through the selection of HARQ optimal parameters. It is also demonstrated that smaller LL buffer sizes than the typical size provide similar TCP throughput whilst higher buffer capacities do not represent significant performanc'e improvement. LL buffer capacity reduction mainly depends on the quality of the transmission over the radio channel.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Reconfigurable transport layer protocol"

1

A Rapidly Reconfigurable, Application Layer, Virtual Environment Network Protocol. Storming Media, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

T. Unix System V Release 3.2 Network Programmer's Guide. Prentice Hall, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Unix System V/386 Release 3.2 Network Programmer's Guide, Issue 47. Prentice Hall, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Reconfigurable transport layer protocol"

1

Wang, Tan, and Ajit Singh. "A User Level, Reliable, and Reconfigurable Transport Layer Protocol." In Distributed Computing - IWDC 2004, 303–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30536-1_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Tan, and Ajit Singh. "Communication Using a Reconfigurable and Reliable Transport Layer Protocol." In Parallel and Distributed Processing and Applications, 788–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30566-8_92.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boyd, Colin, Anish Mathuria, and Douglas Stebila. "Transport Layer Security Protocol." In Protocols for Authentication and Key Establishment, 241–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-58146-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yuchao, and Ke Xu. "A Cross-Layer Transport Protocol Design in the Terminal Systems of DC." In Network Management in Cloud and Edge Computing, 43–64. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0138-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hashmi, Muhammad Adnan, Imran Shafi, Syed Ismail Shah, and Jamil Ahmad. "An Efficient Link Bundling Transport Layer Protocol for Achieving Higher Data Rate and Availability." In Communications in Computer and Information Science, 176–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28962-0_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maha Kavya Sri, J., V. G. Narendra, and Vidya Pai. "Implementing and Testing of Internet of Things (IoT) Technology in Agriculture and Compare the Application Layer Protocols: Message Queuing Telemetry Transport (MQTT) and Hyper Text Transport Protocol (HTTP)." In Communications in Computer and Information Science, 320–33. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0111-1_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Estevez, Claudio. "Addressing Transport Layer Issues in Cloud Computing." In Advances in Educational Technologies and Instructional Design, 79–93. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9924-3.ch006.

Full text
Abstract:
Due to bandwidth limitations and overflowing in the Internet, connectionless transport-layer protocols are migrating to connection-oriented, mainly because of the flow control it offers. Because of this, many Internet Service Providers (ISPs) and network administrators have restricted user traffic to only Transmission Control Protocol (TCP) segments. Optimizing TCP-based protocols will benefit significantly the performance of any centric system, such as the STEM clouds. The challenging scenarios, when using TCP-based systems, are transmitting large files over long distances, as these have a large bandwidth-delay product (BDP) which hinders drastically the performance, even if the network's physical link is broadband (e.g. fiber optics). There are various transport protocols today that address these problems. This chapter aims at explaining the transport layer limitations, an overview of how we arrived at the protocols used today, and some techniques that could be adopted in the future, with a focus on cloud computing systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Harcourt, Alison, George Christou, and Seamus Simpson. "The Quick UDP Internet Connection (QUIC) and Transport Layer Security 1.3 Standards." In Global Standard Setting in Internet Governance, 62–79. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198841524.003.0004.

Full text
Abstract:
Chapter 4 examines the effect of Snowden on security protocols. For twenty years, Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) provided security for Internet traffic. However, the TLS 1.2 protocol developed in 2008 suffered from a series of implementation and security issues. The 2013 Snowden revelations sent shock waves through the engineering community. The extent of the targeting of protocol vulnerabilities by security agencies had been greatly underestimated by the IETF. By 2016, Cisco, Fortinet, and Juniper revealed that the National Security Agency (NSA) had successfully targeted its firewalls for years. However, stasis within the IETF barred upgrade to TLS 1.3. The chapter analyses the emergence and contestation of potential solutions to TLS and how the parallel development of the QUIC protocol by Google opened a window of opportunity to enhance security. The agreement on TLS 1.3 in March 2018 was supported by digital rights groups.
APA, Harvard, Vancouver, ISO, and other styles
9

Sharif, Atif, Vidyasagar Potdar, and A. J. D. Rathnayaka. "Dependency of Transport Functions on IEEE802.11 and IEEE802.15.4 MAC/PHY Layer Protocols for WSN." In Next Generation Data Communication Technologies, 95–123. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-477-2.ch005.

Full text
Abstract:
In WSN transport, layer protocol plays a significant role in maintaining the node’s energy budget. To find out the dependency of Transport layer on MAC/PHY layer, the authors have extensively tested various transport protocols using IEEE 802.11, IEEE 802.15.4 MAC/PHY protocols for WSN. For IEEE802.11 and IEEE802.15.4 with RTS/CTS ON the TCP variants has shown >80% packet delivery ratio and 5-20% packet loss, while for UDP it is around >63% and 19.54-35.18% respectively. On average 1-3% additional energy is consumed for packet retransmissions in IEEE 802.11 with RTS/CTS OFF whereas significant energy efficiency is observed in IEEE802.15.4 case. For IEEE 802.11 with RTS/CTS ON high throughput, low packet drop rate and increased E-2-E delay is observed, while for IEEE 802.15.4 improved power efficiency and jitter behavior is observed. This has led the foundation for the future development of the cross-layered energy efficient transport protocol for WSN.
APA, Harvard, Vancouver, ISO, and other styles
10

"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.

Full text
Abstract:
This chapter introduces to basics of computer networking and associated widely used essential networking communication protocols. The chapter provides the comparison of OSI and TCP model along with details of internet layer protocols including internet protocol (IP), IP addressing schemes, internet control messaging protocol (ICMP), etc. Next, the chapter discusses transport layer protocols transmission control protocol (TCP) and user datagram protocol (UDP) in detail. Application layer protocols including dynamic host control protocol (DHCP), secure shell (SSH), file transfer protocol (FTP), trivial FTP (TFTP), simple network management protocol (SNMP), hyper text transfer protocol secure (HTTPS), network time protocol (NTP), domain name system (DNS), and simple mail transfer protocol (SMTP) are also explained in this chapter. One just cannot attack a networking protocol without knowing how it works. Having a solid introduction about computer networking and network protocols is fundamental in the ethical hacking world. This chapter quickly revisits all essential concepts related to computer networking.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Reconfigurable transport layer protocol"

1

Hashmi, Shafiq, Hussein T. Mouftah, and Nicolas D. Georganas. "A New Transport Layer Sensor Network Protocol." In 2006 Canadian Conference on Electrical and Computer Engineering. IEEE, 2006. http://dx.doi.org/10.1109/ccece.2006.277711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, Henna, and Vincent W. S. Chan. "Transport layer protocol for optical flow-switched networks." In 2013 IEEE International Conference on Communications (ICC). IEEE, 2013. http://dx.doi.org/10.1109/icc.2013.6655151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Hua, Tao Wang, and Tianming Zheng. "Evaluation of Transport Layer Protocol for Satellite Communications." In 2010 International Conference on Internet Technology and Applications (iTAP 2010). IEEE, 2010. http://dx.doi.org/10.1109/itapp.2010.5566290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Voitenko, Iurii, and Mohammad Derawi. "Reliable Cross-Layer Data Transport Protocol for MANETs." In 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems (MASS). IEEE, 2014. http://dx.doi.org/10.1109/mass.2014.99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bigioi, P., E. Steinberg, G. Susanu, and P. Corcoran. "PTP/IP - transport layer for picture transfer protocol." In 2005 Digest of Technical Papers. International Conference on Consumer Electronics, 2005. ICCE. IEEE, 2005. http://dx.doi.org/10.1109/icce.2005.1429699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Suvorova, Elena. "An Approach to Dynamic Reconfigurable Transport Protocol Controller Unit Development." In 2020 26th Conference of Open Innovations Association (FRUCT). IEEE, 2020. http://dx.doi.org/10.23919/fruct48808.2020.9087371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Pravin, Sachin Tripathi, and Pankaj Pal. "Neural network based reliable transport layer protocol for MANET." In 2018 4th International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2018. http://dx.doi.org/10.1109/rait.2018.8389085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Murphy, S. L., and A. U. Shankar. "Service specification and protocol construction for the transport layer." In Symposium proceedings. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/52324.52334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Murphy, S. L., and A. U. Shankar. "A verified connection management protocol for the transport layer." In the ACM workshop. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/55482.55495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Song, Andrew, Henna Huang, and Vincent Chan. "Optical flow-switched transport layer protocol simulation and analysis." In 2016 IEEE International Conference on Communications (ICC). IEEE, 2016. http://dx.doi.org/10.1109/icc.2016.7511586.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Reconfigurable transport layer protocol"

1

Hollenbeck, S. Transport Layer Security Protocol Compression Methods. RFC Editor, May 2004. http://dx.doi.org/10.17487/rfc3749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Friedl, S., A. Popov, A. Langley, and E. Stephan. Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension. RFC Editor, July 2014. http://dx.doi.org/10.17487/rfc7301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ylonen, T. The Secure Shell (SSH) Transport Layer Protocol. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dierks, T., and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC Editor, August 2008. http://dx.doi.org/10.17487/rfc5246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jungmaier, A., E. Rescorla, and M. Tuexen. Transport Layer Security over Stream Control Transmission Protocol. RFC Editor, December 2002. http://dx.doi.org/10.17487/rfc3436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rescorla, E. The Transport Layer Security (TLS) Protocol Version 1.3. RFC Editor, August 2018. http://dx.doi.org/10.17487/rfc8446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dierks, T., and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. RFC Editor, April 2006. http://dx.doi.org/10.17487/rfc4346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Décimo, A., D. Schinazi, and J. Chroboczek. Babel Routing Protocol over Datagram Transport Layer Security. RFC Editor, January 2021. http://dx.doi.org/10.17487/rfc8968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Funk, P., and S. Blake-Wilson. Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0). RFC Editor, August 2008. http://dx.doi.org/10.17487/rfc5281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lennox, J. Connection-Oriented Media Transport over the Transport Layer Security (TLS) Protocol in the Session Description Protocol (SDP). RFC Editor, July 2006. http://dx.doi.org/10.17487/rfc4572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography