-
61
Network layer protocol architecture for many-nets internetworking
Published 2019-10-01Subjects: “…network protocol…”
Get full text
Article -
62
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: Get full text
Article -
63
Algorithmic diagnosis of symptoms and signs : cost effective approach /
Published 1995Subjects: View in OPAC
Book -
64
Algorithmic diagnosis of symptoms and signs : cost effective approach /
Published 1995Subjects: View in OPAC
Book -
65
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01Subjects: “…security protocol…”
Get full text
Article -
66
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01Subjects: Get full text
Article -
67
A Comprehensive Exploration of 6G Wireless Communication Technologies
Published 2025-01-01Subjects: “…non-IP-based networking protocols…”
Get full text
Article -
68
Survey on RDMA protocol applications and security protection technologies
Published 2024-04-01Subjects: Get full text
Article -
69
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01Subjects: “…security protocol…”
Get full text
Article -
70
An Improved Algorithm of Wireless Sensor Networks Routing Protocol Based on LEACH
Published 2013-04-01Subjects: Get full text
Article -
71
Survey on industrial control protocol security research
Published 2024-06-01Subjects: Get full text
Article -
72
Development and outlook of deep space communication network protocol
Published 2016-07-01Subjects: Get full text
Article -
73
Collision and information error of topologies in clustering protocol
Published 2011-01-01Subjects: “…clustering protocol…”
Get full text
Article -
74
Efficient and configurable data transport protocol for grid computing
Published 2007-01-01Subjects: Get full text
Article -
75
Lifetime Attributable Risk in Mammography Screenings in Dubai: The Influence of Breast Thickness and Age on Radiation Exposure
Published 2025-01-01Subjects: “…patient-specific mammography protocols…”
Get full text
Article -
76
Protocol format extraction at semantic level
Published 2013-10-01Subjects: “…protocol reverse engineering…”
Get full text
Article -
77
Design and hardware implementation of a CAN communication protocol
Published 2008-01-01Subjects: Get full text
Article -
78
Protocol publication rate and comparison between article, registry and protocol in RCTs
Published 2025-02-01Subjects: Get full text
Article -
79
Application of Protocol Buffer in Enterprise Cloud Contacts Abstract This paper introduces the method to use Protocol Buffer to update data in enterprise cloud contacts, and compar...
Published 2012-09-01Subjects: “…Protocol Buffer…”
Get full text
Article -
80
Building mechanism of trusted virtual domain via the VPE
Published 2013-12-01Subjects: Get full text
Article